|
|
Showing 1 - 13 of
13 matches in All Departments
Unlike some other reproductions of classic texts (1) We have not
used OCR(Optical Character Recognition), as this leads to bad
quality books with introduced typos. (2) In books where there are
images such as portraits, maps, sketches etc We have endeavoured to
keep the quality of these images, so they represent accurately the
original artefact. Although occasionally there may be certain
imperfections with these old texts, we feel they deserve to be made
available for future generations to enjoy.
Unlike some other reproductions of classic texts (1) We have not
used OCR(Optical Character Recognition), as this leads to bad
quality books with introduced typos. (2) In books where there are
images such as portraits, maps, sketches etc We have endeavoured to
keep the quality of these images, so they represent accurately the
original artefact. Although occasionally there may be certain
imperfections with these old texts, we feel they deserve to be made
available for future generations to enjoy.
Learn to evaluate and compare data encryption methods and attack
cryptographic systems Key Features Explore popular and important
cryptographic methods Compare cryptographic modes and understand
their limitations Learn to perform attacks on cryptographic systems
Book DescriptionCryptography is essential for protecting sensitive
information, but it is often performed inadequately or incorrectly.
Hands-On Cryptography with Python starts by showing you how to
encrypt and evaluate your data. The book will then walk you through
various data encryption methods,such as obfuscation, hashing, and
strong encryption, and will show how you can attack cryptographic
systems. You will learn how to create hashes, crack them, and will
understand why they are so different from each other. In the
concluding chapters, you will use three NIST-recommended systems:
the Advanced Encryption Standard (AES), the Secure Hash Algorithm
(SHA), and the Rivest-Shamir-Adleman (RSA). By the end of this
book, you will be able to deal with common errors in encryption.
What you will learn Protect data with encryption and hashing
Explore and compare various encryption methods Encrypt data using
the Caesar Cipher technique Make hashes and crack them Learn how to
use three NIST-recommended systems: AES, SHA, and RSA Understand
common errors in encryption and exploit them Who this book is
forHands-On Cryptography with Python is for security professionals
who want to learn to encrypt and evaluate data, and compare
different encryption methods.
This scarce antiquarian book is a selection from Kessinger
Publishing's Legacy Reprint Series. Due to its age, it may contain
imperfections such as marks, notations, marginalia and flawed
pages. Because we believe this work is culturally important, we
have made it available as part of our commitment to protecting,
preserving, and promoting the world's literature. Kessinger
Publishing is the place to find hundreds of thousands of rare and
hard-to-find books with something of interest for everyone
|
You may like...
Queen Of Me
Shania Twain
CD
R246
R164
Discovery Miles 1 640
Morbius
Jared Leto, Matt Smith, …
DVD
R374
R210
Discovery Miles 2 100
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
|