Hands-on Cryptography with Python
Par :Formats :
Disponible dans votre compte client Decitre ou Furet du Nord dès validation de votre commande. Le format ePub protégé est :
- Compatible avec une lecture sur My Vivlio (smartphone, tablette, ordinateur)
- Compatible avec une lecture sur liseuses Vivlio
- Pour les liseuses autres que Vivlio, vous devez utiliser le logiciel Adobe Digital Edition. Non compatible avec la lecture sur les liseuses Kindle, Remarkable et Sony
- Non compatible avec un achat hors France métropolitaine
, qui est-ce ?Notre partenaire de plateforme de lecture numérique où vous retrouverez l'ensemble de vos ebooks gratuitement
Pour en savoir plus sur nos ebooks, consultez notre aide en ligne ici
- FormatePub
- ISBN978-93-48107-73-2
- EAN9789348107732
- Date de parution15/01/2025
- Protection num.Adobe DRM
- Infos supplémentairesepub
- ÉditeurORANGE EDUCATION PVT LTD
Résumé
DESCRIPTIONCryptography is the backbone of modern digital security, and Python makes it accessible for everyone. Hands-on Cryptography with Python takes readers from foundational concepts to advanced cryptographic systems, equipping them with both theoretical understanding and practical implementation skills using Python. You'll begin with setting up the platform and Installation and move on to understanding the basics of cryptography-exploring classic ciphers, their evolution, and their role in secure communication.
Next, you'll advance to Symmetric Key Cryptography and Asymmetric Key Cryptography, learning how to implement encryption algorithms step-by-step with Python. As you progress, you'll dive into essential cryptographic components like Hashing and Message Integrity, enabling you to safeguard data and verify its authenticity. The book then introduces miscellaneous cryptographic schemes and highlights the principle that "Security is Only as Strong as the Weakest Link", encouraging you to identify and address vulnerabilities.
Toward the final stages, you'll gain hands-on expertise in TLS Communication, the backbone of secure data exchange on the web. The journey culminates with an exploration of current trends in cryptography, including lightweight cryptography and post-quantum solutions, ensuring you stay ahead in this ever-evolving field. WHAT WILL YOU LEARN? Understand cryptographic techniques from classical to modern approaches.? Implement symmetric and asymmetric encryption using Python.? Design secure systems using hashing and authentication protocols.? Analyze and apply cryptographic algorithms to security challenges.? Explore lightweight cryptography and post-quantum solutions.? Integrate cryptography into IoT and resource-constrained devices. WHO IS THIS BOOK FOR?This book is tailored for security professionals, software developers, researchers and students seeking to implement secure cryptography and secure encryption in real-world applications.
It's also ideal for IoT and embedded systems engineers designing secure solutions for resource-constrained environments, as well as enthusiasts eager to learn about modern cryptography and its practical applications.
Next, you'll advance to Symmetric Key Cryptography and Asymmetric Key Cryptography, learning how to implement encryption algorithms step-by-step with Python. As you progress, you'll dive into essential cryptographic components like Hashing and Message Integrity, enabling you to safeguard data and verify its authenticity. The book then introduces miscellaneous cryptographic schemes and highlights the principle that "Security is Only as Strong as the Weakest Link", encouraging you to identify and address vulnerabilities.
Toward the final stages, you'll gain hands-on expertise in TLS Communication, the backbone of secure data exchange on the web. The journey culminates with an exploration of current trends in cryptography, including lightweight cryptography and post-quantum solutions, ensuring you stay ahead in this ever-evolving field. WHAT WILL YOU LEARN? Understand cryptographic techniques from classical to modern approaches.? Implement symmetric and asymmetric encryption using Python.? Design secure systems using hashing and authentication protocols.? Analyze and apply cryptographic algorithms to security challenges.? Explore lightweight cryptography and post-quantum solutions.? Integrate cryptography into IoT and resource-constrained devices. WHO IS THIS BOOK FOR?This book is tailored for security professionals, software developers, researchers and students seeking to implement secure cryptography and secure encryption in real-world applications.
It's also ideal for IoT and embedded systems engineers designing secure solutions for resource-constrained environments, as well as enthusiasts eager to learn about modern cryptography and its practical applications.



