issue132:critique
Différences
Ci-dessous, les différences entre deux révisions de la page.
Les deux révisions précédentesRévision précédenteProchaine révision | Révision précédente | ||
issue132:critique [2018/05/04 17:30] – christo.2so | issue132:critique [2018/05/10 14:07] (Version actuelle) – andre_domenech | ||
---|---|---|---|
Ligne 7: | Ligne 7: | ||
424 pp. | 424 pp. | ||
Published January 2018** | Published January 2018** | ||
+ | |||
+ | Cracker du code avec Python | ||
+ | Une introduction pour construire et casser du chiffrement | ||
+ | Auteur : Al Sweigart | ||
+ | Editeur : No Starch Press | ||
+ | ISBN : 978-1-59327-822-9 | ||
+ | Prix : $29.95 US | ||
+ | 424 p. | ||
+ | Date de publication : janvier 2018 | ||
+ | (livre uniquement en anglais à ce jour) | ||
**When I was a kid, I was extremely interested in secret codes, as were most young boys. It always seemed cool to be able to send messages to my friends that only we could read. In those days, there were secret decoder rings that were available with box tops from various companies whose products always seemed to be in our homes.** | **When I was a kid, I was extremely interested in secret codes, as were most young boys. It always seemed cool to be able to send messages to my friends that only we could read. In those days, there were secret decoder rings that were available with box tops from various companies whose products always seemed to be in our homes.** | ||
+ | |||
+ | Au cours de mon enfance, j' | ||
+ | |||
**Today, we don’t have to spend, what seemed like forever, collecting pieces of cardboard, sending them to a company a zillion miles away, and then waiting for an even longer eternity, daily checking the mailbox for a package containing our special prize. The fact that the secret decoder ring that finally came was a piece of cheap plastic – that broke after a few months, if even that long – didn’t dampen our enthusiasm. We felt like we finally had a way to be like actual secret agents with our own codes that no one, absolutely no one, could break.** | **Today, we don’t have to spend, what seemed like forever, collecting pieces of cardboard, sending them to a company a zillion miles away, and then waiting for an even longer eternity, daily checking the mailbox for a package containing our special prize. The fact that the secret decoder ring that finally came was a piece of cheap plastic – that broke after a few months, if even that long – didn’t dampen our enthusiasm. We felt like we finally had a way to be like actual secret agents with our own codes that no one, absolutely no one, could break.** | ||
+ | |||
+ | Aujourd' | ||
+ | |||
**Today, Al Sweigart has given us our own secret decoder ring on our own computers – that won’t break in a few months, and makes the process of creating those secret messages so much easier.** | **Today, Al Sweigart has given us our own secret decoder ring on our own computers – that won’t break in a few months, and makes the process of creating those secret messages so much easier.** | ||
+ | |||
+ | Aujourd' | ||
+ | |||
**In his latest book, Cracking Codes With Python, Al gives us the ability to understand what codes and ciphers actually are, how they actually work, and how they actually can be used today. He does this in a gentle manner through Python scripts that anyone can understand. Al works the reader through the entire process, from installing Python (if needed), to understanding the Python programming using these simple (and, in the later chapters, more complicated) ciphers. He even shows the reader how to create a secret cipher wheel.** | **In his latest book, Cracking Codes With Python, Al gives us the ability to understand what codes and ciphers actually are, how they actually work, and how they actually can be used today. He does this in a gentle manner through Python scripts that anyone can understand. Al works the reader through the entire process, from installing Python (if needed), to understanding the Python programming using these simple (and, in the later chapters, more complicated) ciphers. He even shows the reader how to create a secret cipher wheel.** | ||
+ | |||
+ | Dans son dernier livre, « Cracking Codes With Python », Al nous donne la possibilité de comprendre ce que sont réellement le codage et le chiffrement, | ||
+ | |||
**While the book seems to assume that the reader doesn’t know much about Python programming, | **While the book seems to assume that the reader doesn’t know much about Python programming, | ||
+ | |||
+ | Bien que le livre laisse supposer que le lecteur ne sait pas grand chose de la programmation en Python, cela demeure un bon livre que tout programmeur Python doit posséder dans sa bibliothèque, | ||
**I thoroughly enjoyed Cracking Codes With Python and give it five stars.** | **I thoroughly enjoyed Cracking Codes With Python and give it five stars.** | ||
+ | |||
+ | J'ai vraiment aimé Cracking Codes With Python et lui accorde cinq étoiles. | ||
Ligne 48: | Ligne 74: | ||
Programming the Public Key Cipher ** | Programming the Public Key Cipher ** | ||
+ | Table des matières | ||
+ | |||
+ | Fabrication d' | ||
+ | Programmation dans le shell interactif | ||
+ | Chaînes et programmes d' | ||
+ | Le chiffrement inversé | ||
+ | Le chiffrement de César | ||
+ | Hacker le chiffrement de César par force brute | ||
+ | Encrypter avec le chiffrement par transposition | ||
+ | Décrypter avec le chiffrement par transposition | ||
+ | Programmer un programme pour tester son propre programme | ||
+ | Encryptage et décryptage de fichiers | ||
+ | Détection programmatique de l' | ||
+ | Hacker le chiffrement par transposition | ||
+ | Un module d' | ||
+ | Programmation d'un chiffrement Affine | ||
+ | Hacker du chiffrement Affine | ||
+ | Programmation d'un chiffrement par substitution simple | ||
+ | Hacker du chiffrement par substitution simple | ||
+ | Programmation d'un chiffrement Vigenère | ||
+ | Analyse de fréquence | ||
+ | Hacker du chiffrement Vigenère | ||
+ | Chiffrement avec OTP (One-Time-Pad) | ||
+ | Trouver et générer des nombres premiers | ||
+ | Générer des clés pour le chiffrement d'une clé publique | ||
+ | Programmation du chiffrement d'une clé publique |
issue132/critique.1525447813.txt.gz · Dernière modification : 2018/05/04 17:30 de christo.2so