Anbieter: World of Books (was SecondSale), Montgomery, IL, USA
Zustand: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc.
Anbieter: Maxwell's House of Books, La Mesa, CA, USA
Erstausgabe
Soft cover. Zustand: Very Good. 1st Edition. A tight, unmarked softcover in very good condition; light shelf wear; lightly creased cover. We are a brick-and-mortar store and sell our own inventory.
Anbieter: HPB-Emerald, Dallas, TX, USA
paperback. Zustand: Very Good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority!
Anbieter: GreatBookPrices, Columbia, MD, USA
Zustand: New.
Anbieter: Lakeside Books, Benton Harbor, MI, USA
Zustand: New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books!
Anbieter: BargainBookStores, Grand Rapids, MI, USA
Paperback or Softback. Zustand: New. Practical Cryptography in Python: Learning Correct Cryptography by Example. Book.
Anbieter: California Books, Miami, FL, USA
Zustand: New.
Anbieter: GreatBookPrices, Columbia, MD, USA
Zustand: As New. Unread book in perfect condition.
Anbieter: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irland
Erstausgabe
Zustand: New. 2019. 1st ed. Paperback. . . . . .
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 48,22
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: As New. Unread book in perfect condition.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 49,38
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 53,98
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Chiron Media, Wallingford, Vereinigtes Königreich
EUR 50,77
Anzahl: 10 verfügbar
In den WarenkorbPF. Zustand: New.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 56,43
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 371 pages. 9.75x7.00x1.00 inches. In Stock.
Anbieter: Kennys Bookstore, Olney, MD, USA
Zustand: New. 2019. 1st ed. Paperback. . . . . . Books ship from the US and Ireland.
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. Practical Cryptography in Python | Learning Correct Cryptography by Example | Seth James Nielson (u. a.) | Taschenbuch | xv | Englisch | 2019 | Apress | EAN 9781484248997 | Verantwortliche Person für die EU: APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly.Cryptography is the lifeblood of the digital world's security infrastructure. From governments around the world to the average consumer, most communications are protected in some form or another by cryptography. These days, even Google searches are encrypted. Despite its ubiquity, cryptography is easy to misconfigure, misuse, and misunderstand.Developers building cryptographic operations into their applications are not typically experts in the subject, and may not fully grasp the implication of different algorithms, modes, and other parameters. The concepts in this book are largely taught by example, including incorrect uses of cryptography and how 'bad' cryptography can be broken. By digging into the guts of cryptography, you can experience what works, what doesn't, and why.What You'll LearnUnderstand where cryptography is used, why, and how it gets misusedKnow what secure hashing is used for and its basic propertiesGet up to speed on algorithms and modes for block ciphers such as AES, and see how bad configurations breakUse message integrity and/or digital signatures to protect messagesUtilize modern symmetric ciphers such as AES-GCM and CHACHAPractice the basics of public key cryptography, including ECDSA signaturesDiscover how RSA encryption can be broken if insecure padding is usedEmploy TLS connections for secure communicationsFind out how certificates work and modern improvements such as certificate pinning and certificate transparency (CT) logsWho This Book Is ForIT administrators and software developers familiar with Python. Although readers may have some knowledge of cryptography, the book assumes that the reader is starting from scratch.