Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying The Go Workshop
  • Table Of Contents Toc
  • Feedback & Rating feedback
The Go Workshop

The Go Workshop

By : Delio D'Anna , Andrew Hayes , Sam Hennessy , Jeremy Leasor , Gobin Sougrakpam , Dániel Szabó
4.8 (10)
close
close
The Go Workshop

The Go Workshop

4.8 (10)
By: Delio D'Anna , Andrew Hayes , Sam Hennessy , Jeremy Leasor , Gobin Sougrakpam , Dániel Szabó

Overview of this book

The Go Workshop will take the pain out of learning the Go programming language (also known as Golang). It is designed to teach you to be productive in building real-world software. Presented in an engaging, hands-on way, this book focuses on the features of Go that are used by professionals in their everyday work. Each concept is broken down, clearly explained, and followed up with activities to test your knowledge and build your practical skills. Your first steps will involve mastering Go syntax, working with variables and operators, and using core and complex types to hold data. Moving ahead, you will build your understanding of programming logic and implement Go algorithms to construct useful functions. As you progress, you'll discover how to handle errors, debug code to troubleshoot your applications, and implement polymorphism using interfaces. The later chapters will then teach you how to manage files, connect to a database, work with HTTP servers and REST APIs, and make use of concurrent programming. Throughout this Workshop, you'll work on a series of mini projects, including a shopping cart, a loan calculator, a working hours tracker, a web page counter, a code checker, and a user authentication system. By the end of this book, you'll have the knowledge and confidence to tackle your own ambitious projects with Go.
Table of Contents (21 chapters)
close
close
Free Chapter
1
1. Variables and Operators
2
2. Logic and Loops

Cryptography

Go has a very comprehensive crypto library included as part of the standard library, which covers hashing algorithms, PKI certificates, and symmetric and asymmetric encryption algorithms.

While it is convenient to have a collection of different ciphers' encryption and hashing libraries available for us to use, it is important for us to be aware of vulnerabilities in these algorithms, so we can choose the most appropriate algorithm for our use case.

For example, the MD5 and SHA-1 hashing algorithms are not considered safe to use for encrypting data, as they are easily brute-forced. However, they are commonly used by file servers to provide file checksums for error checking.

Hashing Libraries

Hashing is the process of converting plaintext data into an encrypted format by implementing an algorithm to produce the encrypted text. The output of such a process is supposed to be unique and the probability of a hash collision, which is two different inputs producing...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY