issue132:critique
Différences
Ci-dessous, les différences entre deux révisions de la page.
Prochaine révision | Révision précédente | ||
issue132:critique [2018/04/30 12:21] – créée auntiee | issue132:critique [2018/05/10 14:07] (Version actuelle) – andre_domenech | ||
---|---|---|---|
Ligne 1: | Ligne 1: | ||
- | Cracking Codes with Python | + | **Cracking Codes with Python |
An Introduction to Building and Breaking Ciphers | An Introduction to Building and Breaking Ciphers | ||
Author: Al Sweigart | Author: Al Sweigart | ||
Ligne 6: | Ligne 6: | ||
Price: $29.95 US | Price: $29.95 US | ||
424 pp. | 424 pp. | ||
- | Published January 2018 | + | Published January 2018** |
- | When I was a kid, I was extremely interested in secret codes, as were most young boys. It always seemed cool to be able to send messages to my friends that only we could read. In those days, there were secret decoder rings that were available with box tops from various companies whose products always seemed to be in our homes. | + | Cracker du code avec Python |
+ | Une introduction pour construire et casser du chiffrement | ||
+ | Auteur : Al Sweigart | ||
+ | Editeur : No Starch Press | ||
+ | ISBN : 978-1-59327-822-9 | ||
+ | Prix : $29.95 US | ||
+ | 424 p. | ||
+ | Date de publication : janvier 2018 | ||
+ | (livre uniquement en anglais à ce jour) | ||
- | Today, we don’t have to spend, what seemed | + | **When I was a kid, I was extremely interested in secret codes, as were most young boys. It always |
- | Today, Al Sweigart has given us our own secret decoder ring on our own computers – that won’t break in a few months, and makes the process of creating those secret | + | Au cours de mon enfance, j' |
- | In his latest book, Cracking Codes With Python, Al gives us the ability to understand what codes and ciphers actually are, how they actually work, and how they actually can be used today. He does this in a gentle manner through Python scripts that anyone can understand. Al works the reader through the entire process, from installing Python (if needed), to understanding the Python programming using these simple (and, in the later chapters, more complicated) ciphers. He even shows the reader how to create a secret cipher wheel. | ||
- | While the book seems to assume that the reader doesn’t know much about Python programming, | + | **Today, we don’t have to spend, what seemed like forever, collecting pieces |
- | I thoroughly enjoyed Cracking Codes With Python and give it five stars. | + | Aujourd' |
- | Table of Contents | + | **Today, Al Sweigart has given us our own secret decoder ring on our own computers – that won’t break in a few months, and makes the process of creating those secret messages so much easier.** |
+ | |||
+ | Aujourd' | ||
+ | |||
+ | |||
+ | **In his latest book, Cracking Codes With Python, Al gives us the ability to understand what codes and ciphers actually are, how they actually work, and how they actually can be used today. He does this in a gentle manner through Python scripts that anyone can understand. Al works the reader through the entire process, from installing Python (if needed), to understanding the Python programming using these simple (and, in the later chapters, more complicated) ciphers. He even shows the reader how to create a secret cipher wheel.** | ||
+ | |||
+ | Dans son dernier livre, « Cracking Codes With Python », Al nous donne la possibilité de comprendre ce que sont réellement le codage et le chiffrement, | ||
+ | |||
+ | |||
+ | **While the book seems to assume that the reader doesn’t know much about Python programming, | ||
+ | |||
+ | Bien que le livre laisse supposer que le lecteur ne sait pas grand chose de la programmation en Python, cela demeure un bon livre que tout programmeur Python doit posséder dans sa bibliothèque, | ||
+ | |||
+ | **I thoroughly enjoyed Cracking Codes With Python and give it five stars.** | ||
+ | |||
+ | J'ai vraiment aimé Cracking Codes With Python et lui accorde cinq étoiles. | ||
+ | |||
+ | |||
+ | **Table of Contents | ||
Making Paper Cryptography Tools | Making Paper Cryptography Tools | ||
Ligne 46: | Ligne 72: | ||
Finding and Generating Prime Numbers | Finding and Generating Prime Numbers | ||
Generating Keys for the Public Key Cipher | Generating Keys for the Public Key Cipher | ||
- | Programming the Public Key Cipher | + | Programming the Public Key Cipher |
+ | |||
+ | Table des matières | ||
+ | Fabrication d' | ||
+ | Programmation dans le shell interactif | ||
+ | Chaînes et programmes d' | ||
+ | Le chiffrement inversé | ||
+ | Le chiffrement de César | ||
+ | Hacker le chiffrement de César par force brute | ||
+ | Encrypter avec le chiffrement par transposition | ||
+ | Décrypter avec le chiffrement par transposition | ||
+ | Programmer un programme pour tester son propre programme | ||
+ | Encryptage et décryptage de fichiers | ||
+ | Détection programmatique de l' | ||
+ | Hacker le chiffrement par transposition | ||
+ | Un module d' | ||
+ | Programmation d'un chiffrement Affine | ||
+ | Hacker du chiffrement Affine | ||
+ | Programmation d'un chiffrement par substitution simple | ||
+ | Hacker du chiffrement par substitution simple | ||
+ | Programmation d'un chiffrement Vigenère | ||
+ | Analyse de fréquence | ||
+ | Hacker du chiffrement Vigenère | ||
+ | Chiffrement avec OTP (One-Time-Pad) | ||
+ | Trouver et générer des nombres premiers | ||
+ | Générer des clés pour le chiffrement d'une clé publique | ||
+ | Programmation du chiffrement d'une clé publique |
issue132/critique.1525083711.txt.gz · Dernière modification : 2018/04/30 12:21 de auntiee