reklama - zainteresowany?

Applied Cryptography using Python. Use Python to implement encryption, hashing, and cryptographic protocols securely - Helion

Applied Cryptography using Python. Use Python to implement encryption, hashing, and cryptographic protocols securely
ebook
Autor: Ramesh Nagappan, Gourav Shenoy
Tytuł oryginału: Applied Cryptography using Python. Use Python to implement encryption, hashing, and cryptographic protocols securely
ISBN: 9781837639984
Format: ebook
Księgarnia: Helion

Cena książki: 129,00 zł

Książka będzie dostępna od maja 2025

Cryptography is the backbone of modern cybersecurity, protecting sensitive data from cyber threats, hackers, and unauthorized access. Applied Cryptography Using Python is your hands-on guide to understanding and implementing cryptographic techniques using Python. This book takes a practical approach, ensuring you not only grasp the theoretical foundations but also apply them in real-world scenarios, from securing communication channels to encrypting files and managing digital signatures.
Starting with the fundamentals of cryptographic algorithms, symmetric and asymmetric encryption, and hashing techniques, you’ll progress to advanced topics like elliptic curve cryptography, homomorphic encryption, and quantum-safe cryptography. You'll work with industry-standard libraries such as PyCryptodome and cryptography, enabling you to build secure applications and protect sensitive data.
By the end of this book, you’ll have the skills to implement cryptographic solutions, integrate security best practices into software development, and stay ahead in the ever-evolving landscape of cybersecurity.

Spis treści

Applied Cryptography using Python. Use Python to implement encryption, hashing, and cryptographic protocols securely eBook -- spis treści

  • 1. The Role of Cryptography in Security
  • 2. Getting Started with Python Cryptography Libraries
  • 3. Symmetric Key Encryption and Decryption
  • 4. Message Digests and Message Authentication Code (MAC)
  • 5. Password-Based Key Derivation and Encryption
  • 6. Asymmetric Key Encryption and Decryption
  • 7. Digital Signatures
  • 8. Implementing Key Wrapping and Secure Key Exchanges
  • 9. Public Key Infrastructure (PKI) and Role of X509v3 Certificates
  • 10. Cryptographic Hardware Key Stores and Cloud-Hosted Key Management Service

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2025 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.