Cargando…

Java cryptography extensions : practical guide for programmers /

For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Weiss, Jason (Jason R.)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: San Francisco, CA : Elsevier/Morgan Kaufmann, ©2004.
Colección:Practical Guides Ser.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn162577586
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 070806s2004 caua ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OCLCQ  |d N$T  |d YDXCP  |d OCLCE  |d ZCU  |d E7B  |d OCLCQ  |d OCLCF  |d MERUC  |d EBLCP  |d UKDOC  |d DEBSZ  |d OCLCQ  |d UMI  |d OCLCQ  |d COO  |d DEBBG  |d OCLCA  |d OCLCQ  |d STF  |d D6H  |d VTS  |d OCLCQ  |d WYU  |d OCLCQ  |d AJS  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 180771782  |a 469636232  |a 476109849  |a 507273288  |a 607225291  |a 636862635  |a 636862641  |a 647695846  |a 933930950  |a 1035709273  |a 1066491791  |a 1109253109 
020 |a 9780127427515 
020 |a 0127427511 
020 |a 9780080535241  |q (electronic bk.) 
020 |a 0080535240  |q (electronic bk.) 
029 1 |a AU@  |b 000051554354 
029 1 |a CHNEW  |b 001006514 
029 1 |a DEBBG  |b BV039832139 
029 1 |a DEBBG  |b BV042307528 
029 1 |a DEBBG  |b BV043044355 
029 1 |a DEBBG  |b BV043968342 
029 1 |a DEBSZ  |b 405308914 
029 1 |a DEBSZ  |b 422169676 
029 1 |a DEBSZ  |b 430442424 
029 1 |a DEBSZ  |b 434184845 
029 1 |a DEBSZ  |b 485788411 
029 1 |a GBVCP  |b 882749021 
029 1 |a NZ1  |b 12435071 
029 1 |a DKDLA  |b 820120-katalog:9910110209205765 
035 |a (OCoLC)162577586  |z (OCoLC)180771782  |z (OCoLC)469636232  |z (OCoLC)476109849  |z (OCoLC)507273288  |z (OCoLC)607225291  |z (OCoLC)636862635  |z (OCoLC)636862641  |z (OCoLC)647695846  |z (OCoLC)933930950  |z (OCoLC)1035709273  |z (OCoLC)1066491791  |z (OCoLC)1109253109 
037 |a 102587:102606  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
042 |a dlr 
050 4 |a QA76.73.J38  |b W445 2004eb 
072 7 |a COM  |x 083000  |2 bisacsh 
082 0 4 |a 005.8/2  |2 22 
049 |a UAMI 
100 1 |a Weiss, Jason  |q (Jason R.) 
245 1 0 |a Java cryptography extensions :  |b practical guide for programmers /  |c Jason Weiss. 
260 |a San Francisco, CA :  |b Elsevier/Morgan Kaufmann,  |c ©2004. 
300 |a 1 online resource (xv, 158 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a The Practical Guides Ser. 
520 |a For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and its imperative that developers know what kinds of solutions exist. One of Javas solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few. In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesnt overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE. * Written by a seasoned veteran of both cryptography and server-side programming * Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates * Includes a companion web site that contains the code for the examples in the book, open-source cryptographic toolkits, and further resources 
505 0 |a Chapter 1: Understanding Javas Cryptographic Architecture Chapter 2: Working with Symmetric Ciphers Chapter 3: Working with Asymmetric Ciphers and Key Agreement Protocols Chapter 4: Message Digests, Message Authentication Codes, and Digital Signatures Chapter 5: Managing Keys and Certificates Bibliography. 
504 |a Includes bibliographical references (pages 153-154) and index. 
588 0 |a Print version record. 
506 |3 Use copy  |f Restrictions unspecified  |2 star  |5 MiAaHDL 
533 |a Electronic reproduction.  |b [Place of publication not identified] :  |c HathiTrust Digital Library,  |d 2010.  |5 MiAaHDL 
538 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.  |u http://purl.oclc.org/DLF/benchrepro0212  |5 MiAaHDL 
583 1 |a digitized  |c 2010  |h HathiTrust Digital Library  |l committed to preserve  |2 pda  |5 MiAaHDL 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Java (Computer program language) 
650 0 |a Cryptography. 
650 6 |a Java (Langage de programmation) 
650 6 |a Cryptographie. 
650 7 |a COMPUTERS  |x Security  |x Cryptography.  |2 bisacsh 
650 7 |a Cryptography  |2 fast 
650 7 |a Java (Computer program language)  |2 fast 
776 0 8 |i Print version:  |a Weiss, Jason.  |t Java cryptography extensions.  |d San Francisco, CA : Elsevier/Morgan Kaufmann, ©2004  |z 0127427511  |z 9780127427515  |w (DLC) 2003070900  |w (OCoLC)54007135 
830 0 |a Practical Guides Ser. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=210141  |z Texto completo 
938 |a 123Library  |b 123L  |n 39228 
938 |a EBL - Ebook Library  |b EBLB  |n EBL317069 
938 |a ebrary  |b EBRY  |n ebr10206423 
938 |a EBSCOhost  |b EBSC  |n 210141 
938 |a YBP Library Services  |b YANK  |n 2729817 
994 |a 92  |b IZTAP