lab6_support
.py
keyboard_arrow_up
School
College of DuPage *
*We aren’t endorsed by this school
Course
1B
Subject
Computer Science
Date
Feb 20, 2024
Type
py
Pages
1
Uploaded by Caleb8793
# Chat Encryption Helper - ch9_crypto_chat.py
import os, base64, json
#from Crypto.Cipher import PKCS1_OAEP, AES
#from Crypto.PublicKey import RSA, ECC
from binascii import hexlify, unhexlify
from base64 import b64encode, b64decode
# encryption method used by all calls
def encrypt(message, usePKI, useDH, dhSecret):
em=cipherEncrypt(message, dhSecret, 1)
return em
# decryption method used by all calls
def decrypt(message, usePKI, useDH, dhSecret):
dm=cipherEncrypt(message, dhSecret, -1)
return dm
# decrypt using RSA (for future reference, not needed for this homework)
#def decrypt_rsa(ciphertext):
# return ciphertext
# encrypt using RSA (for future reference, not needed for this homework)
#def encrypt_rsa(message):
# return message
# check client commands (for future reference, not needed for this homework)
def check_client_command(data):
return 1
# check server commands (for future reference, not needed for this homework)
def check_server_command(data):
return 1
def reversed_string(a_string):
return a_string[::-1]
def cipherEncrypt(inputText, N, D):
# shift a character by N positions in the specified direction
def shift(char, N, D):
if char.isalpha():
start = 65 if char.isupper() else 97
char_code = ord(char)
shifted_char_code = start + ((char_code - start + D * N) % 26)
return chr(shifted_char_code)
elif char.isdigit():
start = 48
char_code = ord(char)
shifted_char_code = start + ((char_code - start + D * N) % 10)
return chr(shifted_char_code)
return char
# reverse the input text
reversed_text = inputText[::-1]
# encrypt the reversed text
encrypted_text = "".join(shift(char, N, D) for char in reversed_text)
return encrypted_text
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Lab: Caesar Cipher implementation with Python
letters='ABCDEFGHIGKLMNOPQRSTUVWXYZ"
KEY=3
def caesar_encrypt(plain_text):
plain_text=plain_text.upper()
for I in plain_text:
index = letters.find(1)
index= (index + KEY) % len(letters)
cipher_text cipher_text + letters[index]
return cipher_text
cipher_text="
def caesar_decrypt(cipher_text):
plain_text = "
for I in cipher_text:
index = letters.find(1)
index= (index - KEY) % len(letters)
plain_text=plain_text + letters[index]
return plain_text
if name == '_____main__':
message = 'Welcome to my Cryptography class'
encrypted_message = caesar_encrypt(message)
print(encrypted_message)
print(caesar_decrypt(encrypted_message))
In the previous page, we define letters as
'ABCDEFGHIGKLMNOPQRSTUVWXYZ' to obtain the index of a
character in encryption and decryption. The characters in the plain text
and the cipher text have to be from
ABCDEFGHIGKLMNOPQRSTUVWXYZ'.
In this lab, try to modify the code in the previous page to allow your
python code to…
arrow_forward
cryptography in hash function
arrow_forward
q4-
Symmetric Key Encryption uses
a.
One way hashing
b.
Does not need a key for encryption
c.
Same Key for Encryption & Decryption
d.
Uses different keys for encryption and decryption
arrow_forward
Buffer overlow :computer security
In a C program, we print the address of relevant variables and arrays and get the following:
0xbfffe7b8 i
0xbfffe7bc length
0xbfffe7c0 hash_ptr
0xbfffe7ce targetuid
0xbfffe7d5 userid
0xbfffe817 pw
0xbfffe858 t
0xbfffe899 hashhex
0xbfffe8da target
0xbfffe91b hash
0xbfffe95c buffer
The program executes the following instruction:
strcpy(pw, buffer);
You want to exploit the buffer overflow vulnerability by putting in buffer a string aaaaaaaaaaaaa ... 0c0beacef8877bbf2416eb00f2b5dc96354e26dd1df5517320459b1236860f8c
with the goal of putting the hash 0c0beacef8877bbf2416eb00f2b5dc96354e26dd1df5517320459b1236860f8c variable target.
If you count offset as 0 for the first a, 1 for the second a, and so on, what should be the offset of 0, the first character of the hash? In other words, how many a's should you put before the first zero character?
(You can give the answer in decimal or in hexadecimal, but please specify.)
arrow_forward
Task 1:
Explain how prime numbers are important by evaluating an example based on the RSA algorithm.
A. Generate a public/private key pair by
(i) First, choosing the two primes, p and q, so that
• p = 17, and
q is the single digit prime that is closest to the last digit of your national identity number.
Second, choosing the value of e to be greater than 5.
Third, find the multiplicative inverse d of e showing all the steps and calculations.
B. Encrypt a message M = 8, then decrypt the ciphertext to retrieve the original message.
Note: You will use the MATLAB code named 'RSA_Spring2023' to finish this task.
(iii)
arrow_forward
Language: Python
Goal: implement decryption in the attached code block
import argparse
import os
import time
import sys
import string
# Handle command-line arguments
parser = argparse.ArgumentParser()
parser.add_argument("-d", "--decrypt", help='Decrypt a file', required=False)
parser.add_argument("-e", "--encrypt", help='Encrypt a file', required=False)
parser.add_argument("-o", "--outfile", help='Output file', required=False)
args = parser.parse_args()
encrypting = True
try:
ciphertext = open(args.decrypt, "rb").read()
try:
plaintext = open(args.encrypt, "rb").read()
print("You can't specify both -e and -d")
exit(1)
except Exception:
encrypting = False
except Exception:
try:
plaintext = open(args.encrypt, "rb").read()
except Exception:
print("Input file error (did you specify -e or -d?)")
exit(1)
def lrot(n, d):
return ((n << d) & 0xff) | (n >> (8 - d))
if encrypting:
#…
arrow_forward
Q4
You have just finished a Python script called "transfer.py" and decide to produce and keep a hash of the file. Six months later, you produce the hash again and discover it is different. Assuming you did not touch the file "transfer.py", what does a different hash suggest to you?
arrow_forward
Hashing is a technique that is used to uniquely identify a specific object from a group of similar objects. Can you use one or two real-world example(s) to explain what a "hash" really is? How can a programmer implement it?
Pls, give a thorough ans.
arrow_forward
Question # 1: Use the Multiplicative Cipher method to encrypt the following plaintext:We will succeed in our ventureKey length K = 7 You must show all the steps of your workQuestion # 2: Use the additive cipher with key = 15 to decrypt the message “WTAAD”.You must show all the steps of your work
Question # 3: Use the concept of a one-way hash function to encrypt the following name into a 9 x 9 -dimensional database table. Jonathan Leea) How many rows and columns are there on this tableb) Which indices is Jonathan on this tablec) Why are hash functions relevant in database encryption?d) What would you do to remedy the problem of index congestion on your database?You must show all the steps of your work
Question # 4: Use the multiplicative method to decrypt the following ciphertext.MADWU Key = 5You must show all the steps of your workQuestion # 5: use the XOR technique to encrypt the following statement before transmission: The quick brown fox jumps over the lazy dog
arrow_forward
PYTHON
import pandas as pdfrom datetime import dateimport sys
from sklearn.preprocessing import OrdinalEncoder
def series_report( series, is_ordinal=False, is_continuous=False, is_categorical=False): print(f"{series.name}: {series.dtype}") ###### Your code here ###### # Check command line argumentsif len(sys.argv) < 2: print(f"Usage: python3 {sys.argv[0]} <input_file>") exit(1)
# Read in the datadf = pd.read_csv( sys.argv[1], index_col="employee_id")
# Convert strings to dates for dob and deathdf['dob'] = df['dob'].apply(lambda x: date.fromisoformat(x))df['death'] = df['death'].apply(lambda x: date.fromisoformat(x))
# Show the shape of the dataframe(row_count, col_count) = df.shapeprint(f"*** Basics ***")print(f"Rows: {row_count:,}")print(f"Columns: {col_count}")
# Do a report for each columnprint(f"\n*** Columns ***")series_report(df.index, is_ordinal=True)series_report(df["gender"], is_categorical=True)series_report(df["height"], is_ordinal=True,…
arrow_forward
Choose correct option with proper explanation
arrow_forward
A hash function should be independent of the capacity of the hash table.
Select one:
a. False
O b. True
arrow_forward
Subject : Data Structure
Language : C
Topic : Hash Table
Sub Topic :- Pop- Push- Search
Case :
Bluejack Library is one of the popular libraries in the town. This library has more than 50.000 books. Sadly the senior librarian wants to resign and he doesn’t have time to teach the new librarian. Bluejack Library needs a simple program to help the new librarian so he can easily manage and search books. Bluejack Library hires you as a programmer to help them create a program that can help a new librarian find and manage books in this library easily using a C programming language and hashtable data structure. The criteria of the program are:
The program consists of 4 menus, there are:
View Book
Insert Book
Remove Book
Exit
If the user chooses View Book (Menu 1), then:
* If there is no book, then show “There is no book(s) !” message
* Otherwise, the program will show all the book data
If the user chooses Insert Book (Menu 2), then:
- The program will ask user to input the following…
arrow_forward
Subject : Data Structure
Language : C
Topic : Hash Table
Sub Topic :- Pop- Push- Search
Case :
Bluejack Library is one of the popular libraries in the town. This library has more than 50.000 books. Sadly the senior librarian wants to resign and he doesn’t have time to teach the new librarian. Bluejack Library needs a simple program to help the new librarian so he can easily manage and search books. Bluejack Library hires you as a programmer to help them create a program that can help a new librarian find and manage books in this library easily using a C programming language and hashtable data structure. The criteria of the program are:
The program consists of 4 menus, there are:
View Book
Insert Book
Remove Book
Exit
If the user chooses View Book (Menu 1), then:
* If there is no book, then show “There is no book(s) !” message
* Otherwise, the program will show all the book data
If the user chooses Insert Book (Menu 2), then:
- The program will ask user to input the following…
arrow_forward
q10-
Message Integrity is protected by Hashing
Select one:
True
False
arrow_forward
Cryptography
arrow_forward
Answer the following Questions ;
Overload delete operator using cpp
Write advantages of overloading new and delete operator.
Do not Spam if you are real expert. Even Single line Should not be Copied
arrow_forward
write c++ code
Example: 1 key length < block size
Input data:Message: “Hello” → x48656C6C 6FSecret Key: “Key” → x4B6579
Constants for our case hash algorithm (SHA1) with block size 64 bytes:ipad (in HEX): x36363636 36363636 36363636 36363636 36363636 36363636 36363636 36363636 36363636 36363636 36363636 36363636 36363636 36363636 36363636 36363636 (x36 repeated 64 time)opad (in HEX): x5C5C5C5C 5C5C5C5C 5C5C5C5C 5C5C5C5C 5C5C5C5C 5C5C5C5C 5C5C5C5C 5C5C5C5C 5C5C5C5C 5C5C5C5C 5C5C5C5C 5C5C5C5C 5C5C5C5C 5C5C5C5C 5C5C5C5C 5C5C5C5C (x5C repeated 64 time)
Steps of creating HMAC (you could use the calculator to verify the result):
If the key length < block size, we need to add 0s until the key length equals the block size. In our case, the key length is 3 bytes, and the block size is 64 bytes. So new key is K0 = 4B657900 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
We need to perform the operation…
arrow_forward
1. A hashing function converts a large ___ to a small ___.
2. A ___ occurs when two keys hash to the same address.
3. For an open hashing scheme, the records within each bucket are stored in key order ( true / false ).
4. For an open hashing scheme, the most recently inserted record will be on the front end of the bucket list ( true / false )
arrow_forward
This question relates to hash functions for block ciphers
Block size = 4 bits
Hash size = 4 bits
Encryption function: Divide the key into two halves: LK and RK; Divide the plaintext into two halves: LT and RT; Then ciphertext= LC||RC where LC=LK XOR RT; and RC = RK XOR LT; where LC, RC, LT, and RT are each 2 bits; Plaintext and ciphertext are each 4 bits.
g(H) = a 4-bit string that is equal to the complement of bits in H; For example, if H=A (Hexa) = 1010 (binary); then g(H)= 0101
H0 = Initial hash = C (in Hexa)
Given message M: D9 (in Hexa);
a. Determine the hash (in hexadecimal) of the message M using Martyas-Meyer-Oseas hash function
b. Determine the hash (in hexadecimal) of the message M using Davis-Meyer hash function
c. Determine the hash (in hexadecimal) of the message M using Migayuchi-Preneel hash function
arrow_forward
Create an object of MessageDigest class using the java.security.MessageDigest library.
Initialize the object with your selection for an appropriate algorithm cipher.
Use the digest() method of the class to generate a hash value of byte type from the unique data string (your first and last name).
Convert the hash value to hex using the bytesToHex function.
Create a RESTFul route using the @RequestMapping method to generate and return the required information, which includes the hash value, to the web browser.
Here, is the code to edit
package com.snhu.sslserver;
import org.springframework.boot.SpringApplication;import org.springframework.boot.autoconfigure.SpringBootApplication;import org.springframework.web.bind.annotation.RequestMapping;import org.springframework.web.bind.annotation.RestController;
@SpringBootApplicationpublic class ServerApplication {
public static void main(String[] args) { SpringApplication.run(ServerApplication.class, args); }
}…
arrow_forward
Computer Science
How can I hash a file that is full of strings using md5 in python
example pass.txt where i can access [i] when i need to
word
word2
word3
word4
arrow_forward
Prof. Midas. Select all the findings which you will NOT present (i.e., select
all answers which are FALSE).
def key_in_dict(d, k):
for item in d:
if k == item:
return True
return False
O This code would always be slower than the builtin key lookup Python provides.
O A key lookup in a dictionary in Python is generally faster than determining
whether a value is in a list.
O This code is way faster and will be included in the next version of Python
(version 4.1).
O The code is incorrect from a functional perspective, the True and False should
be switched.
O This code could be replaced with one line: return k in d
O The code is correct and would always perform faster than the builtin key
lookup provided by Python.
arrow_forward
implementation in python
arrow_forward
IN PYTHON:
given the data set where the key: value pair is key = item id and value = volume
articles = {0: 54.9763980770002, 1: 45.0029239348998, 2: 61.3426025372739, 3: 80.0, 4: 77.6012305922644, 5: 78.2923783726743, 6: 23.3518777532423, 7: 39.8208126512123, 8: 68.94959337016, 9: 10.4524154059541, 10: 60.4772617438057, 11: 10.0, 12: 79.4241251161082, 13: 50.5316063003593, 14: 10.0, 15: 44.5526777152254, 16: 72.8685047807319, 17: 10.0, 18: 10.0, 19: 46.3487596059364, 20: 10.0, 21: 73.0560543111617}
bin_cap = 100 (each bin has the same cap)
write a function
def binpack(articles,bin_cap):
bin_contents= []
that returns bin_contents: A list of lists, where each sub-list indicates the dictionary keys for the items assigned to each bin. Each sublist contains the item id numbers (integers) for the items contained in that bin. The integers refer to keys in the items dictionary.
arrow_forward
Hash Function
arrow_forward
In this question don’t change code, just in python postgreSQL but solve the question and follow the instructions
arrow_forward
A typical hash function often consists of the following three steps:
Group of answer choices
hashing, compressing, and indexing.
multiplication, addition, and modularization.
selecting, digitizing, and combining.
modularization, probing, and indexing.
compressing, hashing, and probing.
arrow_forward
What are some of the more prevalent issues with hashing?
arrow_forward
Task The Randomness of One-way Hash
To understand the properties of one-way hash functions, we would like to do the following exercise for MD5 and SHA256:
Create a text file of any length.
Generate the hash value H1 for this file using a specific hash algorithm.
Flip one bit of the input file. You can achieve this modification using ghex or Bless.
Generate the hash value H2 for the modified file.
Please observe whether H1 and H2 are similar or not. Please describe your observations in the lab
report.
arrow_forward
Request:
Can you please provide some C code to answer the following prompt?
Question:
Consider a hash table to size 10. Write a program to insert the following keys 27, 6, 9, 32, 82, 12 and 56 into a chained hash table. Write a code to delete a key form the chained hash table
arrow_forward
Note : Write in Bash Language
Write simple fork() code to print child and parent values taken from user. Take two different values from user one for child and one for parent. ( Hint :- Use 0,1 for parent and child.)
arrow_forward
Crack the following hashes obtained from a Windows system:Note: you'll want to utilize a wordlist attack with the rockyou.txt wordlist. Some passwords may need to apply rules or try common types of passwords used in a password spray attack.
Tom:1004:8846F7EAEE8FB117AD06BDD830B7586C:::Stacy:1005:0AFAD548835E4B4B4C1A011ECA19F781:::
Tom's password is:
Stacy's password is:
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Related Questions
- Lab: Caesar Cipher implementation with Python letters='ABCDEFGHIGKLMNOPQRSTUVWXYZ" KEY=3 def caesar_encrypt(plain_text): plain_text=plain_text.upper() for I in plain_text: index = letters.find(1) index= (index + KEY) % len(letters) cipher_text cipher_text + letters[index] return cipher_text cipher_text=" def caesar_decrypt(cipher_text): plain_text = " for I in cipher_text: index = letters.find(1) index= (index - KEY) % len(letters) plain_text=plain_text + letters[index] return plain_text if name == '_____main__': message = 'Welcome to my Cryptography class' encrypted_message = caesar_encrypt(message) print(encrypted_message) print(caesar_decrypt(encrypted_message)) In the previous page, we define letters as 'ABCDEFGHIGKLMNOPQRSTUVWXYZ' to obtain the index of a character in encryption and decryption. The characters in the plain text and the cipher text have to be from ABCDEFGHIGKLMNOPQRSTUVWXYZ'. In this lab, try to modify the code in the previous page to allow your python code to…arrow_forwardcryptography in hash functionarrow_forwardq4- Symmetric Key Encryption uses a. One way hashing b. Does not need a key for encryption c. Same Key for Encryption & Decryption d. Uses different keys for encryption and decryptionarrow_forward
- Buffer overlow :computer security In a C program, we print the address of relevant variables and arrays and get the following: 0xbfffe7b8 i 0xbfffe7bc length 0xbfffe7c0 hash_ptr 0xbfffe7ce targetuid 0xbfffe7d5 userid 0xbfffe817 pw 0xbfffe858 t 0xbfffe899 hashhex 0xbfffe8da target 0xbfffe91b hash 0xbfffe95c buffer The program executes the following instruction: strcpy(pw, buffer); You want to exploit the buffer overflow vulnerability by putting in buffer a string aaaaaaaaaaaaa ... 0c0beacef8877bbf2416eb00f2b5dc96354e26dd1df5517320459b1236860f8c with the goal of putting the hash 0c0beacef8877bbf2416eb00f2b5dc96354e26dd1df5517320459b1236860f8c variable target. If you count offset as 0 for the first a, 1 for the second a, and so on, what should be the offset of 0, the first character of the hash? In other words, how many a's should you put before the first zero character? (You can give the answer in decimal or in hexadecimal, but please specify.)arrow_forwardTask 1: Explain how prime numbers are important by evaluating an example based on the RSA algorithm. A. Generate a public/private key pair by (i) First, choosing the two primes, p and q, so that • p = 17, and q is the single digit prime that is closest to the last digit of your national identity number. Second, choosing the value of e to be greater than 5. Third, find the multiplicative inverse d of e showing all the steps and calculations. B. Encrypt a message M = 8, then decrypt the ciphertext to retrieve the original message. Note: You will use the MATLAB code named 'RSA_Spring2023' to finish this task. (iii)arrow_forwardLanguage: Python Goal: implement decryption in the attached code block import argparse import os import time import sys import string # Handle command-line arguments parser = argparse.ArgumentParser() parser.add_argument("-d", "--decrypt", help='Decrypt a file', required=False) parser.add_argument("-e", "--encrypt", help='Encrypt a file', required=False) parser.add_argument("-o", "--outfile", help='Output file', required=False) args = parser.parse_args() encrypting = True try: ciphertext = open(args.decrypt, "rb").read() try: plaintext = open(args.encrypt, "rb").read() print("You can't specify both -e and -d") exit(1) except Exception: encrypting = False except Exception: try: plaintext = open(args.encrypt, "rb").read() except Exception: print("Input file error (did you specify -e or -d?)") exit(1) def lrot(n, d): return ((n << d) & 0xff) | (n >> (8 - d)) if encrypting: #…arrow_forward
- Q4 You have just finished a Python script called "transfer.py" and decide to produce and keep a hash of the file. Six months later, you produce the hash again and discover it is different. Assuming you did not touch the file "transfer.py", what does a different hash suggest to you?arrow_forwardHashing is a technique that is used to uniquely identify a specific object from a group of similar objects. Can you use one or two real-world example(s) to explain what a "hash" really is? How can a programmer implement it? Pls, give a thorough ans.arrow_forwardQuestion # 1: Use the Multiplicative Cipher method to encrypt the following plaintext:We will succeed in our ventureKey length K = 7 You must show all the steps of your workQuestion # 2: Use the additive cipher with key = 15 to decrypt the message “WTAAD”.You must show all the steps of your work Question # 3: Use the concept of a one-way hash function to encrypt the following name into a 9 x 9 -dimensional database table. Jonathan Leea) How many rows and columns are there on this tableb) Which indices is Jonathan on this tablec) Why are hash functions relevant in database encryption?d) What would you do to remedy the problem of index congestion on your database?You must show all the steps of your work Question # 4: Use the multiplicative method to decrypt the following ciphertext.MADWU Key = 5You must show all the steps of your workQuestion # 5: use the XOR technique to encrypt the following statement before transmission: The quick brown fox jumps over the lazy dogarrow_forward
- PYTHON import pandas as pdfrom datetime import dateimport sys from sklearn.preprocessing import OrdinalEncoder def series_report( series, is_ordinal=False, is_continuous=False, is_categorical=False): print(f"{series.name}: {series.dtype}") ###### Your code here ###### # Check command line argumentsif len(sys.argv) < 2: print(f"Usage: python3 {sys.argv[0]} <input_file>") exit(1) # Read in the datadf = pd.read_csv( sys.argv[1], index_col="employee_id") # Convert strings to dates for dob and deathdf['dob'] = df['dob'].apply(lambda x: date.fromisoformat(x))df['death'] = df['death'].apply(lambda x: date.fromisoformat(x)) # Show the shape of the dataframe(row_count, col_count) = df.shapeprint(f"*** Basics ***")print(f"Rows: {row_count:,}")print(f"Columns: {col_count}") # Do a report for each columnprint(f"\n*** Columns ***")series_report(df.index, is_ordinal=True)series_report(df["gender"], is_categorical=True)series_report(df["height"], is_ordinal=True,…arrow_forwardChoose correct option with proper explanationarrow_forwardA hash function should be independent of the capacity of the hash table. Select one: a. False O b. Truearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education