logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Handson Cryptography With Python Leverage The Power Of Python To Encrypt And Decrypt Data Bowne

  • SKU: BELL-36465338
Handson Cryptography With Python Leverage The Power Of Python To Encrypt And Decrypt Data Bowne
$ 31.00 $ 45.00 (-31%)

5.0

80 reviews

Handson Cryptography With Python Leverage The Power Of Python To Encrypt And Decrypt Data Bowne instant download after payment.

Publisher: Packt Publishing
File Extension: PDF
File size: 8.73 MB
Pages: 100
Author: Bowne, Samuel
ISBN: 9781789534443, 1789534445
Language: English
Year: 2018

Product desciption

Handson Cryptography With Python Leverage The Power Of Python To Encrypt And Decrypt Data Bowne by Bowne, Samuel 9781789534443, 1789534445 instant download after payment.

Learn to evaluate and compare data encryption methods and attack cryptographic systems Key Features Explore popular and important cryptographic methods Compare cryptographic modes and understand their limitations Learn to perform attacks on cryptographic systems Book Description Cryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly. Hands-On Cryptography with Python starts by showing you how to encrypt and evaluate your data. The book will then walk you through various data encryption methods,such as obfuscation, hashing, and strong encryption, and will show how you can attack cryptographic systems. You will learn how to create hashes, crack them, and will understand why they are so different from each other. In the concluding chapters, you will use three NIST-recommended systems: the Advanced Encryption Standard (AES), the Secure Hash Algorithm (SHA), and the Rivest-Shamir-Adleman (RSA). By the end of this book, you will be able to deal with common errors in encryption. What you will learn Protect data with encryption and hashing Explore and compare various encryption methods Encrypt data using the Caesar Cipher technique Make hashes and crack them Learn how to use three NIST-recommended systems: AES, SHA, and RSA Understand common errors in encryption and exploit them Who this book is for Hands-On Cryptography with Python is for security professionals who want to learn to encrypt and evaluate data, and compare different encryption methods.

Related Products