Cargando…

Java cryptography /

Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic cer...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Knudsen, Jonathan
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, Calif. : O'Reilly, ©1998.
Edición:1st ed.
Colección:Java series (O'Reilly & Associates)
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_ocm42854480
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 980619s1998 enka ob 001 0 eng d
010 |z  00500283  
040 |a N$T  |b eng  |e pn  |c N$T  |d OCL  |d OCLCQ  |d VLB  |d OCLCQ  |d TUU  |d OCLCQ  |d TNF  |d CUSER  |d VMI  |d OCLCQ  |d ZCU  |d OCLCO  |d OCLCF  |d IDEBK  |d OCLCQ  |d GO9  |d YDXCP  |d OCLCQ  |d COO  |d OCLCQ  |d FEM  |d SUR  |d Z5A  |d OCLCA  |d OCLCQ  |d LUE  |d CEF  |d OCLCQ  |d TOF  |d OCLCQ  |d WYU  |d TKN  |d UAB  |d JZ6  |d UKAHL  |d VT2  |d TUHNV  |d INARC  |d OCLCO  |d OCLCQ  |d IOY  |d OCLCQ 
019 |a 42417257  |a 54116245  |a 326799997  |a 748108354  |a 759513736  |a 809691133  |a 961616480  |a 962587621  |a 968041634  |a 969006511  |a 1044209231  |a 1056381560  |a 1061012753  |a 1063810245  |a 1103279836  |a 1129371903  |a 1202566286  |a 1240506457  |a 1243576297  |a 1244848542 
020 |a 0585032297  |q (electronic bk.) 
020 |a 9780585032290  |q (electronic bk.) 
020 |a 9781565924024 
020 |a 1565924029 
020 |a 9781449391263  |q (e-book) 
020 |a 1449391265  |q (e-book) 
020 |a 9781449390617 
020 |a 1449390617 
020 |z 1565924029 
029 1 |a AU@  |b 000023265426 
029 1 |a HEBIS  |b 291458734 
029 1 |a NZ1  |b 14520524 
035 |a (OCoLC)42854480  |z (OCoLC)42417257  |z (OCoLC)54116245  |z (OCoLC)326799997  |z (OCoLC)748108354  |z (OCoLC)759513736  |z (OCoLC)809691133  |z (OCoLC)961616480  |z (OCoLC)962587621  |z (OCoLC)968041634  |z (OCoLC)969006511  |z (OCoLC)1044209231  |z (OCoLC)1056381560  |z (OCoLC)1061012753  |z (OCoLC)1063810245  |z (OCoLC)1103279836  |z (OCoLC)1129371903  |z (OCoLC)1202566286  |z (OCoLC)1240506457  |z (OCoLC)1243576297  |z (OCoLC)1244848542 
037 |a 5196111540076580328  |b TotalBoox  |f Ebook only  |n www.totalboox.com 
050 4 |a QA76.73.J38  |b K59 1998eb 
082 0 4 |a 005.82 
049 |a UAMI 
100 1 |a Knudsen, Jonathan. 
245 1 0 |a Java cryptography /  |c Jonathan Knudsen. 
250 |a 1st ed. 
260 |a Sebastopol, Calif. :  |b O'Reilly,  |c ©1998. 
300 |a 1 online resource (xvi, 344) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rda 
490 1 |a Java series 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
520 |a Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with. This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java Cryptography Architecture (JCA). Another set of classes, the Java Cryptography Extension (JCE), provides additional cryptographic functionality. This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards. The book is designed for moderately experienced Java programmers who want to learn how to build cryptography into their applications. No prior knowledge of cryptography is assumed. The book is peppered with useful examples, ranging from simple demonstrations in the first chapter to full-blown applications in later chapters. Topics include: The Java Cryptography Architecture (JCA) The Java Cryptography Extension (JCE) Cryptographic providers The Sun key management tools Message digests, digital signatures, and certificates (X509v3) Block and stream ciphers Implementations of the ElGamal signature and cipher algorithms A network talk application that encrypts all data sent over the network An email application that encrypts its messagesCovers JDK 1.2 and JCE 1.2. 
505 0 0 |t Who Are You? --  |t About This Book --  |t What's Not in This Book --  |t About the Examples --  |t Versions --  |t File Naming --  |t CLASSPATH --  |t Variable Naming --  |t Downloading --  |t Font Conventions --  |t Request for Comments --  |g 1.  |t Introduction --  |t Secure Systems --  |t Cryptography --  |t Platform Security --  |t Astute Inequalities --  |t Hello, zoT1wy --  |g 1.  |t njA0=! --  |t Masher --  |t SecretWriting --  |g 2.  |t Concepts --  |t Confidentiality --  |t Symmetric Ciphers --  |t Asymmetric Ciphers --  |t Hybrid Systems --  |t Distributing Keys --  |t Key Agreement Protocols --  |t Integrity --  |t Authentication --  |t Certificates --  |t Certificate Chains --  |t Random Numbers --  |t Algorithms. 
505 0 0 |t Size Does MatterNames and Numbers --  |t MD5 --  |t SHA-1 --  |t HmacMD5 and HmacSHA1 --  |t DSA --  |t ElGamal signatures --  |t DES --  |t DESede --  |t PBEWithMD5AndDES --  |t ElGamal ciphers --  |t DH --  |g 3.  |t Architecture --  |t Alphabet Soup --  |t Concept Classes --  |t API and SPI --  |t Factory Methods --  |t Standard Names --  |t The Provider Architecture --  |t Key Management --  |t Summary --  |g 4.  |t Random Numbers --  |t SecureRandom --  |t Self-Seeding --  |t Keyboard Timing --  |t Seeder --  |t Counter --  |t Pitfalls --  |t SeederDialog --  |g 5.  |t Key Management --  |t Keys --  |t Key Generators --  |t KeyPairGenerator --  |t KeyGenerator --  |t Algorithm-Specific Initialization --  |t Key Translators --  |t SecretKeySpec --  |t SecretKeyFactory --  |t From things to keys. 
505 0 0 |t From keys to thingsKeyFactory --  |t Key Agreement --  |t Diffie-Hellman --  |t javax.crypto. KeyAgreement --  |t SKIP --  |t SkipServer --  |t SkipClient --  |t Skipper: Multiparty key agreement --  |t The Identity Key Management Paradigm --  |t Key Holders --  |t Principal --  |t Identity --  |t Signer --  |t IdentityScope --  |t KeyManager --  |t The KeyStore Key Management Paradigm --  |t KeyStore --  |t Getting --  |t Loading and saving --  |t Adding private key entries --  |t Adding trusted certificate entries --  |t Retrieving entries --  |t keytool --  |t Creating a key pair --  |t Ubiquitous options and defaults --  |t Inspecting the keystore --  |t Generating a CSR --  |t Importing certificates --  |t Other options. 
505 0 0 |t Changing the default keystore class --  |g 6.  |t Authentication --  |t Message Digests --  |t Getting --  |t Feeding --  |t Digesting --  |t One, Two, Three! --  |t Digest Streams --  |t Protected Password Login --  |t Double-Strength Password Login --  |t MACs --  |t Setting Up --  |t Feeding --  |t Calculating the Code --  |t For Instance --  |t Signatures --  |t Generating a Signature --  |t Verifying a Signature --  |t Hancock --  |t Login, Again --  |t SignedObject --  |t Certificates --  |t java.security.cert. Certificate --  |t Generating a Certificate --  |t Verifying a Certificate --  |t X.509 --  |t Spill --  |t Certificate Revocation Lists --  |g 7.  |t Encryption --  |t Streams and Blocks --  |t Block Ciphers --  |t Padding --  |t PKCS#5 --  |t Other padding schemes. 
505 0 0 |t ModesECB --  |t CBC --  |t PCBC --  |t CFB --  |t OFB --  |t Other modes --  |t Algorithms --  |t javax.crypto. Cipher --  |t Getting a Cipher --  |t Basic Information --  |t Initializing a Cipher --  |t Generic --  |t Name brand --  |t Feeding Data to a Cipher --  |t Cipher's Close Relatives --  |t Cipher Streams --  |t javax.crypto. SealedObject --  |t Passphrase Encryption --  |t Salt and Vinegar --  |t Test Drive --  |t Inside Cipher --  |t SPI --  |t Setup --  |t Basic information --  |t Initializing --  |t Feeding --  |t BlockCipher --  |t CBCWrapper --  |t CFBWrapper --  |t Hybrid Systems --  |t PGP --  |t S/MIME --  |t SSL --  |t Sources --  |t Using the browser --  |t SET --  |g 8.  |t Signed Applets --  |t Renegade --  |t HotJava --  |t Prepare a Signer --  |t Bundle the Applet --  |t Sign the Applet --  |t Test the Applet. 
505 0 0 |t Set Up the Browser. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Java (Computer program language) 
650 0 |a Data encryption (Computer science) 
650 0 |a Cryptography. 
650 6 |a Java (Langage de programmation) 
650 6 |a Chiffrement (Informatique) 
650 6 |a Cryptographie. 
650 1 7 |a Data encryption (Computer science)  |2 bisacsh 
650 7 |a Cryptography.  |2 fast  |0 (OCoLC)fst00884552 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
650 7 |a Java (Computer program language)  |2 fast  |0 (OCoLC)fst00982065 
776 0 8 |i Print version:  |a Knudsen, Jonathan.  |t Java cryptography.  |b 1st ed.  |d Sebastopol, Calif. : O'Reilly, ©1998  |z 1565924029  |w (OCoLC)39319009 
830 0 |a Java series (O'Reilly & Associates) 
856 4 0 |u https://learning.oreilly.com/library/view/~/1565924029/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26847860 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26847880 
938 |a EBSCOhost  |b EBSC  |n 1376 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis28409322 
938 |a YBP Library Services  |b YANK  |n 1987131 
938 |a YBP Library Services  |b YANK  |n 7489276 
938 |a YBP Library Services  |b YANK  |n 11204701 
938 |a Internet Archive  |b INAR  |n javacryptography0000knud 
994 |a 92  |b IZTAP