Limit search to available items
Book Cover
E-book
Author Hook, David, 1962-

Title Beginning cryptography with Java / David Hook
Published Indianapolis, IN : Wiley Pub., 2005

Copies

Description 1 online resource (xxxii, 448 pages) : illustrations
Series Programmer to programmer
Programmer to programmer
Contents The JCA and the JCE -- Symmetric key cryptography -- Message digests, MACs, and HMACs -- Asymmetric key cryptography -- Object description in cryptography using ASN. 1 -- Distinguished names and certificates -- Certificate revocation and path validation -- Key and certificate management using keystores -- CMS and S/MIME -- SSL and TLS -- Appendix A : Solutions To exercises -- Appendix B : Algorithms provided by the Bouncy Castle provider -- Appendix C : Using the Bouncy Castle API for elliptic curve -- Appendix D : Bibliography and further reading
Summary Beginning Cryptography with JavaWhile cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN. 1 packages, all with plenty of examples. Building on that foun
Bibliography Includes bibliographical references and index
Notes Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL
Print version record
digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL
Subject Computer security
Cryptography
Public key infrastructure (Computer security)
Java (Computer program language)
Computer Security
COMPUTERS -- Internet -- Security.
COMPUTERS -- Networking -- Security.
COMPUTERS -- Security -- General.
Computer security
Cryptography
Java (Computer program language)
Public key infrastructure (Computer security)
Java Programmiersprache
Kryptologie
Form Electronic book
ISBN 9780471757016
0471757012