Kirjojen hintavertailu. Mukana 11 244 527 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

6 kirjaa tekijältä Anish Nath

The Modern Cryptography Cookbook: Learn from Crypto Prinicple to Applied Cryptography with Example
The Modern Cryptography CookBook: This books covers various quick and advanced concept which you can adapt practice hands-on and explore more than 1000+ recipes which include various encryption and decryption algorithms along with other crypto related functions. The goal is to achieve Cryptography principle to applied cryptography What you will Learn There are more than 1000+ crypto recipes. This gives you more intuitive learning on Cryptography. These crypto recipes comes handy for sysops/sysadmin/developers/devsecops/researchers for debugging and performing crypto related functions on day-to-day job or generating Idea around cryptography. Most of the practical examples used in this book is done by using openssl Encoders & Decoders URL Encode Decode Base64 Encode Decode ASCII string to hex Convert ASCII to Hex Learn Various PEM Formats Cryptography Algorithms Symmetric Key cryptography Authenticated encryption Types of Asymmetric Key Algorithms Quantum Breakable Algorithms Quantum Secure Algorithms Cryptography Algorithms Symmetric Key cryptography Block ciphers Modes of Operation Authenticated encryption (both encryption and message integrity) Quantum Breakable Algorithms Quantum Secure Algorithms AES (Encryption/Decryption) DES (Encryption/Decryption) 3DES (Encryption/Decryption) BlowFish(Encryption/Decryption) RC4 (Encryption/Decryption) Assymtetric Key Cryptography RSA (Encryption/Decryption) DSA (Keygen, Sign File, Verify Sig) PKI ECDSA Key exchange Diffie-Hellman Message Digests MAC (Message Authentication Codes) HMAC Generate HMAC Secure Password Hashing bcrypt password hash PBKDF2 (PBE Encryption/Decryption) scrypt password hash Crypt hash functions and limitation MD5 password generate Generate password for /etc/password Cipher Suite Managing Certificates.(Self Sign/rootCA, create ecc, rsa, dsa certificates) SMIME GPG (Sign/verify/store, create Authentication Key ) GnuPG for SSH authentication Hardening Modern Certificates & TLS Configuration Nginx Secure Configuration () Apache Secure Configuration HAProxy Secure Configuration AWS ELB Secure Configuration Testing HTTPS Services Openssl HTTPS Testing SSH Key Gen Java Keytool/Keystore IPtables tlsv1.3
Cryptography for JavaScript Developer: Web Cryptography Api, Sjcl
This book is for javascript developers, programmers who want to get into cryptography in programming way What you will learn WEB CRYPTOGRAPHY APIWEB CRYPTO API SUPPORTED ALGORITHMS AND METHODSGENERATE RANDOM NUMBERSAES - GENERATE KEY/EXPORT KEY (JWK)AES - ENCRYPTION/DECRYPTIONAES - ENCRYPTION/DECRYPTION USING RAW KEYSHA - HASHINGPBKDF2PBKDF2 HMAC digital SignatureECDH generate key perform encryption and decryption ECDSA generate key perform sign and verify of message RSA-OAEP ENCRYPTION/DECRYPTIONRSASSA-PKCS1-V1_5RSA-PSS - generateKey/sign/VerifyPKCS8 IMPORT RSA PRIVATE KEY (OPENSSL)SPKI IMPORT RSA PUBLIC KEY (OPENSSL)MAPPING BETWEEN JSON WEB KEY/ WEB CRYPTOThe Stanford JavaScript Crypto Library SJCL CODECSJCL HashingSJCL AES Encryption and decryptionSJCL ECDSA sing verify message SJCL ELGAMAL generate key perform encryption
Python Cryptography

Python Cryptography

Anish Nath

Independently Published
2018
nidottu
Learning cryptography and security is fun instead of saying it hard or Complex. This books covers cookbook style of cryptography using python as a programming language. Chapters presented in this book are independent and can be read in any order What you will Learn pyca/cryptographyFernet Encryption, Multifernet, X,509, AES Encryption & Decryption Authenticated Encryption (GCM, CCM)RSA, DSA, DH, ECDH, X25519, PBKDF2, HKDF, ConcatHKDF, X963KDF, scrrypt, PYcrypto, HASHING, AES, BLOWFISH, RSA, DSA, ELGAMAL, JWCrypto, JWK, JWS, JW
Packet Analysis with Wireshark

Packet Analysis with Wireshark

Anish Nath

Packt Publishing Limited
2015
nidottu
Leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing improved protocol analysis About This Book • Gain hands-on experience of troubleshooting errors in TCP/IP and SSL protocols through practical use cases • Identify and overcome security flaws in your network to get a deeper insight into security analysis • This is a fast-paced book that focuses on quick and effective packet captures through practical examples and exercises Who This Book Is For If you are a network or system administrator who wants to effectively capture packets, a security consultant who wants to audit packet flows, or a white hat hacker who wants to view sensitive information and remediate it, this book is for you. This book requires decoding skills and a basic understanding of networking. What You Will Learn • Utilize Wireshark's advanced features to analyze packet captures • Locate the vulnerabilities in an application server • Get to know more about protocols such as DHCPv6, DHCP, DNS, SNMP, and HTTP with Wireshark • Capture network packets with tcpdump and snoop with examples • Find out about security aspects such as OS-level ARP scanning • Set up 802.11 WLAN captures and discover more about the WAN protocol • Enhance your troubleshooting skills by understanding practical TCP/IP handshake and state diagrams In Detail Wireshark provides a very useful way to decode an RFC and examine it. The packet captures displayed in Wireshark give you an insight into the security and flaws of different protocols, which will help you perform the security research and protocol debugging. The book starts by introducing you to various packet analyzers and helping you find out which one best suits your needs. You will learn how to use the command line and the Wireshark GUI to capture packets by employing filters. Moving on, you will acquire knowledge about TCP/IP communication and its use cases. You will then get an understanding of the SSL/TLS flow with Wireshark and tackle the associated problems with it. Next, you will perform analysis on application-related protocols. We follow this with some best practices to analyze wireless traffic. By the end of the book, you will have developed the skills needed for you to identify packets for malicious attacks, intrusions, and other malware attacks. Style and approach This is an easy-to-follow guide packed with illustrations and equipped with lab exercises to help you reproduce scenarios using a sample program and command lines.
Go Cryptography

Go Cryptography

Anish Nath

Independently Published
2018
nidottu
The style and approach is used in this book is to full-fill all of the cryptography needs for the go lang programmer from beginner to advanced level. What you will learn using go cryptography book Encoding and decoding, Random Number generation, Blake Hashing, RIPEMD160 Hashing, HKDF, PBKDF2, Argon2, Scrypt, Bcrypt, RSA Encryption/Decryption Sign and Verify, DSA Sign and Verify, ECDSA Sing and Verify, Curve25519, Nacl CryptographyAES Encryption and Decryption, chacha20poly1305, RC4, BlowFish, TwoFish, 3DES, HMAC, OpenPGP, SSH-Client, HTTPS, x.509, PKCS8, EncryptedPEM, OCSP