Implementing cryptography using python / (Record no. 6370)

MARC details
000 -LEADER
fixed length control field 06739nam a22002655i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240112130941.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200610s2020 inu 000 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119612209
Qualifying information (paperback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781119612223
Qualifying information (adobe pdf)
040 ## - CATALOGING SOURCE
Original cataloging agency BUL
Transcribing agency BUL
Modifying agency BUL
Language of cataloging eng
Description conventions rda
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23
Classification number 005.824
Item number BRA
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Bray, Shannon.
245 10 - TITLE STATEMENT
Title Implementing cryptography using python /
Statement of responsibility, etc. Shannon Bray.
250 ## - EDITION STATEMENT
Edition statement 1st edition
263 ## - PROJECTED PUBLICATION DATE
Projected publication date 2007
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Indianapolis :
Name of producer, publisher, distributor, manufacturer John Wiley and Sons,
Date of production, publication, distribution, manufacture, or copyright notice 2020.
300 ## - PHYSICAL DESCRIPTION
Extent xix, 284 p. :
Other physical details ill. ;
Dimensions 25 cm
500 ## - GENERAL NOTE
General note Contents<br/><br/>Chapter 1 Introduction to Cryptography and Python <br/><br/>Exploring Algorithms <br/><br/>Why Use Python? <br/><br/>Downloading and Installing Python <br/><br/>Installing on Ubuntu <br/><br/>Installing on macOS <br/><br/>Installing on Windows <br/><br/>Installing on a Chromebook <br/><br/>Installing Additional Packages <br/><br/>Installing Pip, NumPy, and Matplotlib <br/><br/>Installing the Cryptography Package <br/><br/>Installing Additional Packages <br/><br/>Testing Your Install <br/><br/>Diving into Python Basics <br/><br/>Using Variables <br/><br/>Using Strings <br/><br/>Introducing Operators <br/><br/>Understanding Arithmetic Operators <br/><br/>Understanding Comparison Operators <br/><br/>Understanding Logical Operators <br/><br/>Understanding Assignment Operators <br/><br/>Understanding Bitwise Operators <br/><br/>Understanding Membership Operators <br/><br/>Understanding Identity Operators <br/><br/>Using Conditionals <br/><br/>Using Loops <br/><br/>for <br/><br/>while <br/><br/>continue <br/><br/>break <br/><br/>else <br/><br/>Using Files <br/><br/>Understanding Python Semantics <br/><br/>Sequence Types <br/><br/>Introducing Custom Functions <br/><br/>Downloading Files Using Python <br/><br/>Introducing Python Modules <br/><br/>Creating a Reverse Cipher <br/><br/>Summary <br/><br/><br/>Chapter 2 Cryptographic Protocols and Perfect Secrecy<br/><br/>The Study of Cryptology <br/><br/>Understanding Cryptography <br/><br/>Cryptography’s Famous Family: Alice and Bob <br/><br/>Diffie-Hellman <br/><br/>Data Origin Authentication <br/><br/>Entity Authentication <br/><br/>Symmetric Algorithms <br/><br/>Asymmetric Algorithms <br/><br/>The Needham-Schroeder Protocols <br/><br/>The Otway-Rees Protocol <br/><br/>Kerberos <br/><br/>Multiple-Domain Kerberos <br/><br/>X.509 <br/><br/>Formal Validation of Cryptographic Protocols <br/><br/>Configuring Your First Cryptographic Library <br/><br/>Understanding Cryptanalysis <br/><br/>Brute-Force Attacks <br/><br/>Side-Channel Attacks <br/><br/>Social Engineering <br/><br/>Analytical Attacks <br/><br/>Frequency Analysis <br/><br/>Attack Models <br/><br/>Shannon’s Theorem <br/><br/>One-Time Pad <br/><br/>XOR, AND, and OR <br/><br/>One-Time Pad Function <br/><br/>One-Way Hashes <br/><br/>Cryptographic One-Way Hashes <br/><br/>Message Authentication Codes <br/><br/>Perfect Forward Secrecy <br/><br/>Published and Proprietary Encryption Algorithms <br/><br/>Summary <br/><br/>References <br/><br/><br/>Chapter 3 Classical Cryptography <br/><br/>Password Best Practices <br/><br/>Password Storage <br/><br/>Hashing Passwords <br/><br/>Salting Passwords<br/><br/>Stretching Passwords <br/><br/>Password Tools<br/><br/>Obfuscating Data <br/><br/>ASCII Encoding <br/><br/>Base64 Encoding Text <br/><br/>Binary Data <br/><br/>Decoding <br/><br/>Historical Ciphers <br/><br/>Scytale of Sparta <br/><br/>Substitution Ciphers <br/><br/>Caesar Cipher <br/><br/>ROT-13 <br/><br/>Atbash Cipher <br/><br/>Vigenère Cipher <br/><br/>Playfair <br/><br/>Hill 2x2 <br/><br/>Column Transposition <br/><br/>Affine Cipher <br/><br/>Summary <br/><br/><br/>Chapter 4 Cryptographic Math and Frequency Analysis<br/><br/>Modular Arithmetic and the Greatest Common Devisor <br/><br/>Prime Numbers <br/><br/>Prime Number Theorem <br/><br/>School Primality Test <br/><br/>Fermat’s Little Theorem <br/><br/>Miller-Rabin Primality Test <br/><br/>Generate Large Prime Numbers <br/><br/>Basic Group Theory <br/><br/>Orders of Elements <br/><br/>Modular Inverses <br/><br/>Fermat’s Little Theorem to Find the Inverse <br/><br/>Extending the GCD <br/><br/>Euler’s Theorem <br/><br/>Pseudorandomness <br/><br/>Breaking C’s rand() Function <br/><br/>Solving Systems of Linear Equations <br/><br/>Frequency Analysis <br/><br/>Cryptanalysis with Python <br/><br/>Using an Online Word List <br/><br/>Determining the Frequency <br/><br/>Breaking the Vigenère Cipher <br/><br/>Summary <br/><br/><br/>Chapter 5 Stream Ciphers and Block Ciphers <br/><br/>Convert between Hexdigest and Plaintext <br/><br/>Use Stream Ciphers <br/><br/>ARC4 <br/><br/>Vernam Cipher <br/><br/>Salsa20 Cipher <br/><br/>ChaCha Cipher <br/><br/>Use Block Ciphers <br/><br/>Block Modes of Operations <br/><br/>ECB Mode <br/><br/>CBC Mode <br/><br/>CFB Mode <br/><br/>OFB Mode <br/><br/>CTR Mode <br/><br/>Tricks with Stream Modes <br/><br/>DIY Block Cipher Using Feistel Networks <br/><br/>Advanced Encryption Standard (AES) <br/><br/>Using AES with Python <br/><br/>File Encryption Using AES <br/><br/>File Decryption Using AES <br/><br/>Summary <br/><br/><br/>Chapter 6 Using Cryptography with Images <br/><br/>Simple Image Cryptography <br/><br/>Images and Cryptography Libraries <br/><br/>Understanding the Cryptography Library <br/><br/>Understanding the Cryptosteganography Library<br/><br/>Image Cryptography <br/><br/>File Cryptography Using Fernet <br/><br/>Image Cryptography Using Fernet <br/><br/>AES and Block Modes of Operations <br/><br/>Exploring a Simple ECB Mode Example <br/><br/>Exploring a Simple CBC Mode Example<br/><br/>Applying the Examples <br/><br/>Steganography <br/><br/>Storing a Message Inside an Image <br/><br/>Storing a Binary File Inside an Image <br/><br/>Working with large images <br/><br/>Summary <br/><br/><br/>Chapter 7 Message Integrity <br/><br/>Message Authentication Codes <br/><br/>Hash-based Message Authentication Code <br/><br/>Using HMAC to Sign Message <br/><br/>Message Digest with SHA <br/><br/>Binary Digests <br/><br/>NIST Compliance <br/><br/>CBC-MAC <br/><br/>Birthday Attacks <br/><br/>Crafting Forgeries <br/><br/>The Length Extension Attack <br/><br/>Setting Up a Secure Channel <br/><br/>Communication Channels <br/><br/>Sending Secure Messages over IP Networks <br/><br/>Create a Server Socket <br/><br/>Create a Client Socket <br/><br/>Create a Threaded Server with TCP <br/><br/>Adding Symmetric Encryption <br/><br/>Concatenate Message and MAC <br/><br/>Summary <br/><br/>References <br/><br/><br/>Chapter 8 Cryptographic Applications and PKI <br/><br/>The Public-Key Transformation <br/><br/>Exploring the Basics of RSA <br/><br/>Generating RSA Certificates <br/><br/>Constructing Simple Text Encryption and Decryption with RSA Certificates <br/><br/>Constructing BLOB Encryption and<br/><br/>Decryption with RSA Certificates <br/><br/>The El-Gamal Cryptosystem <br/><br/>Elliptic Curve Cryptography <br/><br/>Generating ECC Keys <br/><br/>Key Lengths and Curves <br/><br/>Diffie-Hellman Key Exchange <br/><br/>Summary <br/><br/><br/>Chapter 9 Mastering Cryptography Using Python <br/><br/>Constructing a Plaintext Communications Application <br/><br/>Creating a Server <br/><br/>Creating the Client <br/><br/>Creating the Helper File <br/><br/>Execution <br/><br/>Installing and Testing Wireshark <br/><br/>Implementing PKI in the Application Using RSA Certificates <br/><br/>Modifying the Server <br/><br/>Modifying the Client <br/><br/>Modifying the Helper File <br/><br/>Execution <br/><br/>Implementing Diffie-Hellman Key Exchange <br/><br/>Modifying the Server File <br/><br/>Modifying the Client File <br/><br/>Modifying the Helper File <br/><br/>Creating the Diffie-Hellman Class File <br/><br/>Execution <br/><br/>Wrapping Up
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer Security
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data Encryption
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book Closed Access
Classification part 005.824
Item part 1
Call number prefix BRA
Call number suffix 005.824 BRA
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Inventory number Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Engineering Library Engineering Library 09/22/2021 Purchase 0027607   005.824 BRA 1 BUML24010295 09/22/2021 1 09/22/2021 Book Closed Access