feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Berkeley, CA :Apress, | Berkeley, CA :Apress.
    UID:
    edoccha_BV049492881
    Format: 1 Online-Ressource (XIV, 443 p. 137 illus).
    Edition: 1st ed. 2023
    ISBN: 978-1-4842-9560-1
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-4842-9559-5
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-4842-9561-8
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Berkeley, CA :Apress, | Berkeley, CA :Apress.
    UID:
    edocfu_BV049492881
    Format: 1 Online-Ressource (XIV, 443 p. 137 illus).
    Edition: 1st ed. 2023
    ISBN: 978-1-4842-9560-1
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-4842-9559-5
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-4842-9561-8
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Berkeley, CA :Apress, | Berkeley, CA :Apress.
    UID:
    almafu_BV049492881
    Format: 1 Online-Ressource (XIV, 443 p. 137 illus).
    Edition: 1st ed. 2023
    ISBN: 978-1-4842-9560-1
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-4842-9559-5
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-4842-9561-8
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV046190578
    Format: 1 Online-Ressource (XV, 371 Seiten) , Illustrationen
    ISBN: 9781484249000
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-4842-4899-7
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-4842-4901-7
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: Datenschutz ; Computersicherheit ; Python ; Kryptologie ; Kryptologie ; Python 3.x ; Lehrbuch
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    b3kat_BV049492881
    Format: 1 Online-Ressource (XIV, 443 p. 137 illus)
    Edition: 1st ed. 2023
    ISBN: 9781484295601
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-4842-9559-5
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-4842-9561-8
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_BV046230754
    Format: xv, 371 Seiten : , Illustrationen, Diagramme.
    ISBN: 978-1-4842-4899-7
    Series Statement: For professionals by professionals
    Note: Auf der Coverrückseite: "Shelve in: Security, User level: intermediate"
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-1-4842-4900-0
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: Kryptologie ; Python 3.x ; Datenschutz ; Computersicherheit ; Python ; Kryptologie ; Lehrbuch
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    edocfu_9959151442502883
    Format: 1 online resource (XV, 371 p. 39 illus.)
    Edition: 1st ed. 2019.
    ISBN: 1-4842-4900-3
    Content: Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the life blood of the digital world’s security infrastructure. From governments around the world to the average consumer, most communications are protected in some form or another by cryptography. These days, even Google searches are encrypted. Despite its ubiquity, cryptography is easy to misconfigure, misuse, and misunderstand. Developers building cryptographic operations into their applications are not typically experts in the subject, and may not fully grasp the implication of different algorithms, modes, and other parameters. The concepts in this book are largely taught by example, including incorrect uses of cryptography and how "bad" cryptography can be broken. By digging into the guts of cryptography, you can experience what works, what doesn't, and why. What You’ll Learn: Understand where cryptography is used, why, and how it gets misused Know what secure hashing is used for and its basic properties Get up to speed on algorithms and modes for block ciphers such as AES, and see how bad configurations break Use message integrity and/or digital signatures to protect messages Utilize modern symmetric ciphers such as AES-GCM and CHACHA Practice the basics of public key cryptography, including ECDSA signatures Discover how RSA encryption can be broken if insecure padding is used Employ TLS connections for secure communications Find out how certificates work and modern improvements such as certificate pinning and certificate transparency (CT) logs.
    Note: Chapter 1: Cryptography: More Than Secrecy -- Chapter 2: Hashing -- Chapter 3: Symmetric Encryption: Two Sides, One Key -- Chapter 4: Asymmetric Encryption: Public/Private Keys -- Chapter 5: Message Integrity, Signatures, and Certificates -- Chapter 6: Combining Asymmetric and Symmetric Algorithms -- Chapter 7: More Symmetric Crypto: Authenticated Encryption and Kerberos -- Chapter 8: TLS Communications -- Bibliography.-.
    Additional Edition: ISBN 1-4842-4899-6
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    almafu_9959151442502883
    Format: 1 online resource (XV, 371 p. 39 illus.)
    Edition: 1st ed. 2019.
    ISBN: 1-4842-4900-3
    Content: Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the life blood of the digital world’s security infrastructure. From governments around the world to the average consumer, most communications are protected in some form or another by cryptography. These days, even Google searches are encrypted. Despite its ubiquity, cryptography is easy to misconfigure, misuse, and misunderstand. Developers building cryptographic operations into their applications are not typically experts in the subject, and may not fully grasp the implication of different algorithms, modes, and other parameters. The concepts in this book are largely taught by example, including incorrect uses of cryptography and how "bad" cryptography can be broken. By digging into the guts of cryptography, you can experience what works, what doesn't, and why. What You’ll Learn: Understand where cryptography is used, why, and how it gets misused Know what secure hashing is used for and its basic properties Get up to speed on algorithms and modes for block ciphers such as AES, and see how bad configurations break Use message integrity and/or digital signatures to protect messages Utilize modern symmetric ciphers such as AES-GCM and CHACHA Practice the basics of public key cryptography, including ECDSA signatures Discover how RSA encryption can be broken if insecure padding is used Employ TLS connections for secure communications Find out how certificates work and modern improvements such as certificate pinning and certificate transparency (CT) logs.
    Note: Chapter 1: Cryptography: More Than Secrecy -- Chapter 2: Hashing -- Chapter 3: Symmetric Encryption: Two Sides, One Key -- Chapter 4: Asymmetric Encryption: Public/Private Keys -- Chapter 5: Message Integrity, Signatures, and Certificates -- Chapter 6: Combining Asymmetric and Symmetric Algorithms -- Chapter 7: More Symmetric Crypto: Authenticated Encryption and Kerberos -- Chapter 8: TLS Communications -- Bibliography.-.
    Additional Edition: ISBN 1-4842-4899-6
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    almahu_9948170546802882
    Format: XV, 371 p. 39 illus. , online resource.
    Edition: 1st ed. 2019.
    ISBN: 9781484249000
    Content: Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the life blood of the digital world’s security infrastructure. From governments around the world to the average consumer, most communications are protected in some form or another by cryptography. These days, even Google searches are encrypted. Despite its ubiquity, cryptography is easy to misconfigure, misuse, and misunderstand. Developers building cryptographic operations into their applications are not typically experts in the subject, and may not fully grasp the implication of different algorithms, modes, and other parameters. The concepts in this book are largely taught by example, including incorrect uses of cryptography and how "bad" cryptography can be broken. By digging into the guts of cryptography, you can experience what works, what doesn't, and why. What You’ll Learn: Understand where cryptography is used, why, and how it gets misused Know what secure hashing is used for and its basic properties Get up to speed on algorithms and modes for block ciphers such as AES, and see how bad configurations break Use message integrity and/or digital signatures to protect messages Utilize modern symmetric ciphers such as AES-GCM and CHACHA Practice the basics of public key cryptography, including ECDSA signatures Discover how RSA encryption can be broken if insecure padding is used Employ TLS connections for secure communications Find out how certificates work and modern improvements such as certificate pinning and certificate transparency (CT) logs.
    Note: Chapter 1: Cryptography: More Than Secrecy -- Chapter 2: Hashing -- Chapter 3: Symmetric Encryption: Two Sides, One Key -- Chapter 4: Asymmetric Encryption: Public/Private Keys -- Chapter 5: Message Integrity, Signatures, and Certificates -- Chapter 6: Combining Asymmetric and Symmetric Algorithms -- Chapter 7: More Symmetric Crypto: Authenticated Encryption and Kerberos -- Chapter 8: TLS Communications -- Bibliography.-.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9781484248997
    Additional Edition: Printed edition: ISBN 9781484249017
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages