Essential Cryptography for JavaScript Developers: A practical guide to leveraging common cryptographic operations in Node.js and the browser

دانلود کتاب Essential Cryptography for JavaScript Developers: A practical guide to leveraging common cryptographic operations in Node.js and the browser

51000 تومان موجود

کتاب رمزنگاری ضروری برای توسعه دهندگان جاوا اسکریپت: راهنمای عملی برای استفاده از عملیات رمزنگاری رایج در Node.js و مرورگر نسخه زبان اصلی

دانلود کتاب رمزنگاری ضروری برای توسعه دهندگان جاوا اسکریپت: راهنمای عملی برای استفاده از عملیات رمزنگاری رایج در Node.js و مرورگر بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 5


توضیحاتی در مورد کتاب Essential Cryptography for JavaScript Developers: A practical guide to leveraging common cryptographic operations in Node.js and the browser

نام کتاب : Essential Cryptography for JavaScript Developers: A practical guide to leveraging common cryptographic operations in Node.js and the browser
عنوان ترجمه شده به فارسی : رمزنگاری ضروری برای توسعه دهندگان جاوا اسکریپت: راهنمای عملی برای استفاده از عملیات رمزنگاری رایج در Node.js و مرورگر
سری :
نویسندگان :
ناشر : Packt Publishing
سال نشر :
تعداد صفحات : 220
ISBN (شابک) : 9781801075336 , 1801075336
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 5 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Cover\nTitle page\nCopyright and Credits\nDedication\nContributors\nTable of Contents\nPreface\nPart 1 – Getting Started\nChapter 1: Cryptography for Developers\n What is cryptography and why should a developer care?\n Protecting secrets…\n …and the other uses of modern cryptography\n Why this matters to developers\n What this book is about – and what it\'s not\n Rules of engagement\n Defining \"safe\"\n Types and \"layers\" of encryption\n Summary\nChapter 2: Dealing with Binary and Random Data\n Encoding and representing binary data\n A brief word on character encodings and why we encode binary data\n Buffers in Node.js\n Hex encoding\n Base64\n Generating cryptographically secure random byte sequences\n The importance of randomness\n Using crypto.randomBytes\n Summary\nPart 2 – Using Common Cryptographic Operations with Node.js\nChapter 3: File and Password Hashing with Node.js\n Technical requirements\n An overview of hashing functions\n Properties of hashing functions, and how they differ from encryption\n Uses for hashing functions\n Calculating digests and generating identifiers\n Hashing a short message or string\n Hashing large files and streams\n How to \"break\" a hash\n Fast hashing functions and low-entropy inputs\n Rainbow tables\n Hashing passwords and deriving keys\n Argon2\n Scrypt\n Older hashing functions\n Collisions\n Summary\nChapter 4: Symmetric Encryption in Node.js\n Technical requirements\n Symmetric and asymmetric encryption\n Symmetric encryption with AES\n Key length\n Mode of operation\n Initialization vector\n Using AES with Node.js\n Symmetric encryption with ChaCha20-Poly1305\n Example usage with Node.js\n When to use ChaCha20-Poly1305 or AES-GCM\n Key derivation\n Reusing keys\n Wrapping keys and best practices for encrypting large documents\n AES Key Wrap\n Wrapping user keys\n Summary\nChapter 5: Using Asymmetric and Hybrid Encryption in Node.js\n Technical requirements\n Understanding public-key and hybrid cryptosystems\n The need for public-key cryptography\n Hybrid cryptosystems\n Loading, exporting, and encoding public and private keys\n Encoding keys as PEM\n Reading and exporting keys\n Using RSA with Node.js\n Generating an RSA key pair\n Using RSA for encryption and decryption\n Hybrid encryption with RSA and AES\n Key agreements with Elliptic-Curve Diffie-Hellman\n Picking a curve\n Generating EC key pairs\n Diffie-Hellman key agreements and Perfect Forward Secrecy\n Performing an ECDH key agreement\n Data encryption with ECIES\n Summary\nChapter 6: Digital Signatures with Node.js and Trust\n Technical requirements\n The what, how, and why of digital signatures\n Hashes and digital signatures\n Properties of digital signatures\n How digital signatures work\n Digital signatures and encryption\n How developers use digital signatures\n Calculating and verifying digital signatures with Node.js\n Using RSA\n Using elliptic curves\n Trust and certificates\n The problem of trusting keys\n Public keys and certificates\n Public Key Infrastructure\n Alternative approaches\n Summary\nPart 3 – Cryptography in the Browser\nChapter 7: Introduction to Cryptography in the Browser\n Technical requirements\n Playground\n In Node.js\n About cryptography in the browser – uses and challenges\n Challenges of cryptography in the browser\n Building browser-based apps that use cryptography\n Binary data in the browser\n Buffers and typed arrays in the browser\n Generating random data\n Keys in Web Crypto\n The CryptoKey object\n Generating keys\n Importing keys\n Exporting keys\n Summary\nChapter 8: Performing Common Cryptographic Operations in the Browser\n Technical requirements\n Hashing and key derivation\n Calculating checksums\n Hashing passwords\n Deriving encryption keys\n Symmetric encryption\n Encrypting and decrypting messages with AES\n Asymmetric and hybrid cryptography\n Encrypting and decrypting short messages with RSA\n Hybrid encryption with RSA and AES\n Using elliptic curves for ECDH key agreements and ECIES hybrid encryption\n Digital signatures\n Digital signatures with the WebCrypto APIs\n Calculating and verifying RSA signatures\n Calculating and verifying ECDSA signatures\n Summary\nIndex\nAbout Packt\nOther Books You May Enjoy




پست ها تصادفی