Java cryptography extensions: practical guide for programmers
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
San Francisco, CA
Elsevier/Morgan Kaufmann
c2004
|
Schriftenreihe: | Practical Guides Ser
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and its imperative that developers know what kinds of solutions exist. One of Javas solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few. In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesnt overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE. * Written by a seasoned veteran of both cryptography and server-side programming * Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates * Includes a companion web site that contains the code for the examples in the book, open-source cryptographic toolkits, and further resources Chapter 1: Understanding Javas Cryptographic Architecture Chapter 2: Working with Symmetric Ciphers Chapter 3: Working with Asymmetric Ciphers and Key Agreement Protocols Chapter 4: Message Digests, Message Authentication Codes, and Digital Signatures Chapter 5: Managing Keys and Certificates Bibliography Includes bibliographical references (p. 153-154) and index |
Beschreibung: | 1 Online-Ressource (xv, 158 p.) |
ISBN: | 0080535240 0127427511 9780080535241 9780127427515 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043044355 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151123s2004 |||| o||u| ||||||eng d | ||
020 | |a 0080535240 |c electronic bk. |9 0-08-053524-0 | ||
020 | |a 0127427511 |9 0-12-742751-1 | ||
020 | |a 9780080535241 |c electronic bk. |9 978-0-08-053524-1 | ||
020 | |a 9780127427515 |9 978-0-12-742751-5 | ||
035 | |a (OCoLC)162577586 | ||
035 | |a (DE-599)BVBBV043044355 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8/2 |2 22 | |
100 | 1 | |a Weiss, Jason, (Jason R.) |e Verfasser |4 aut | |
245 | 1 | 0 | |a Java cryptography extensions |b practical guide for programmers |c Jason Weiss |
264 | 1 | |a San Francisco, CA |b Elsevier/Morgan Kaufmann |c c2004 | |
300 | |a 1 Online-Ressource (xv, 158 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Practical Guides Ser | |
500 | |a For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and its imperative that developers know what kinds of solutions exist. | ||
500 | |a One of Javas solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few. In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesnt overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. | ||
500 | |a No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE. * Written by a seasoned veteran of both cryptography and server-side programming * Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates * Includes a companion web site that contains the code for the examples in the book, open-source cryptographic toolkits, and further resources | ||
500 | |a Chapter 1: Understanding Javas Cryptographic Architecture Chapter 2: Working with Symmetric Ciphers Chapter 3: Working with Asymmetric Ciphers and Key Agreement Protocols Chapter 4: Message Digests, Message Authentication Codes, and Digital Signatures Chapter 5: Managing Keys and Certificates Bibliography | ||
500 | |a Includes bibliographical references (p. 153-154) and index | ||
650 | 7 | |a COMPUTERS / Security / Cryptography |2 bisacsh | |
650 | 7 | |a Cryptography |2 fast | |
650 | 7 | |a Java (Computer program language) |2 fast | |
650 | 4 | |a Java (Computer program language) | |
650 | 4 | |a Cryptography | |
650 | 0 | 7 | |a Java |g Programmiersprache |0 (DE-588)4401313-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Java |g Programmiersprache |0 (DE-588)4401313-9 |D s |
689 | 0 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=210141 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028468892 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=210141 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=210141 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175410054823936 |
---|---|
any_adam_object | |
author | Weiss, Jason, (Jason R.) |
author_facet | Weiss, Jason, (Jason R.) |
author_role | aut |
author_sort | Weiss, Jason, (Jason R.) |
author_variant | j j r w jjr jjrw |
building | Verbundindex |
bvnumber | BV043044355 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)162577586 (DE-599)BVBBV043044355 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04839nmm a2200553zc 4500</leader><controlfield tag="001">BV043044355</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151123s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080535240</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-053524-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0127427511</subfield><subfield code="9">0-12-742751-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080535241</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-053524-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780127427515</subfield><subfield code="9">978-0-12-742751-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162577586</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043044355</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Weiss, Jason, (Jason R.)</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Java cryptography extensions</subfield><subfield code="b">practical guide for programmers</subfield><subfield code="c">Jason Weiss</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Francisco, CA</subfield><subfield code="b">Elsevier/Morgan Kaufmann</subfield><subfield code="c">c2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xv, 158 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Practical Guides Ser</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and its imperative that developers know what kinds of solutions exist. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">One of Javas solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few. In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesnt overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE. * Written by a seasoned veteran of both cryptography and server-side programming * Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates * Includes a companion web site that contains the code for the examples in the book, open-source cryptographic toolkits, and further resources</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Chapter 1: Understanding Javas Cryptographic Architecture Chapter 2: Working with Symmetric Ciphers Chapter 3: Working with Asymmetric Ciphers and Key Agreement Protocols Chapter 4: Message Digests, Message Authentication Codes, and Digital Signatures Chapter 5: Managing Keys and Certificates Bibliography</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 153-154) and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Cryptography</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Java (Computer program language)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Java (Computer program language)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Java</subfield><subfield code="g">Programmiersprache</subfield><subfield code="0">(DE-588)4401313-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Java</subfield><subfield code="g">Programmiersprache</subfield><subfield code="0">(DE-588)4401313-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=210141</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028468892</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=210141</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=210141</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043044355 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:15:50Z |
institution | BVB |
isbn | 0080535240 0127427511 9780080535241 9780127427515 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028468892 |
oclc_num | 162577586 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xv, 158 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Elsevier/Morgan Kaufmann |
record_format | marc |
series2 | Practical Guides Ser |
spelling | Weiss, Jason, (Jason R.) Verfasser aut Java cryptography extensions practical guide for programmers Jason Weiss San Francisco, CA Elsevier/Morgan Kaufmann c2004 1 Online-Ressource (xv, 158 p.) txt rdacontent c rdamedia cr rdacarrier Practical Guides Ser For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and its imperative that developers know what kinds of solutions exist. One of Javas solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few. In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesnt overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE. * Written by a seasoned veteran of both cryptography and server-side programming * Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates * Includes a companion web site that contains the code for the examples in the book, open-source cryptographic toolkits, and further resources Chapter 1: Understanding Javas Cryptographic Architecture Chapter 2: Working with Symmetric Ciphers Chapter 3: Working with Asymmetric Ciphers and Key Agreement Protocols Chapter 4: Message Digests, Message Authentication Codes, and Digital Signatures Chapter 5: Managing Keys and Certificates Bibliography Includes bibliographical references (p. 153-154) and index COMPUTERS / Security / Cryptography bisacsh Cryptography fast Java (Computer program language) fast Java (Computer program language) Cryptography Java Programmiersprache (DE-588)4401313-9 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Java Programmiersprache (DE-588)4401313-9 s Kryptologie (DE-588)4033329-2 s 1\p DE-604 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=210141 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Weiss, Jason, (Jason R.) Java cryptography extensions practical guide for programmers COMPUTERS / Security / Cryptography bisacsh Cryptography fast Java (Computer program language) fast Java (Computer program language) Cryptography Java Programmiersprache (DE-588)4401313-9 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4401313-9 (DE-588)4033329-2 |
title | Java cryptography extensions practical guide for programmers |
title_auth | Java cryptography extensions practical guide for programmers |
title_exact_search | Java cryptography extensions practical guide for programmers |
title_full | Java cryptography extensions practical guide for programmers Jason Weiss |
title_fullStr | Java cryptography extensions practical guide for programmers Jason Weiss |
title_full_unstemmed | Java cryptography extensions practical guide for programmers Jason Weiss |
title_short | Java cryptography extensions |
title_sort | java cryptography extensions practical guide for programmers |
title_sub | practical guide for programmers |
topic | COMPUTERS / Security / Cryptography bisacsh Cryptography fast Java (Computer program language) fast Java (Computer program language) Cryptography Java Programmiersprache (DE-588)4401313-9 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | COMPUTERS / Security / Cryptography Cryptography Java (Computer program language) Java Programmiersprache Kryptologie |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=210141 |
work_keys_str_mv | AT weissjasonjasonr javacryptographyextensionspracticalguideforprogrammers |