Java cryptography extensions :: practical guide for programmers /
For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
San Francisco, CA :
Elsevier/Morgan Kaufmann,
©2004.
|
Schriftenreihe: | Practical Guides Ser.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and its imperative that developers know what kinds of solutions exist. One of Javas solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few. In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesnt overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE. * Written by a seasoned veteran of both cryptography and server-side programming * Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates * Includes a companion web site that contains the code for the examples in the book, open-source cryptographic toolkits, and further resources |
Beschreibung: | 1 online resource (xv, 158 pages) : illustrations |
Format: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |
Bibliographie: | Includes bibliographical references (pages 153-154) and index. |
ISBN: | 9780127427515 0127427511 9780080535241 0080535240 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn162577586 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 070806s2004 caua ob 001 0 eng d | ||
040 | |a OPELS |b eng |e pn |c OPELS |d OCLCQ |d N$T |d YDXCP |d OCLCE |d ZCU |d E7B |d OCLCQ |d OCLCF |d MERUC |d EBLCP |d UKDOC |d DEBSZ |d OCLCQ |d UMI |d OCLCQ |d COO |d DEBBG |d OCLCA |d OCLCQ |d STF |d D6H |d VTS |d OCLCQ |d WYU |d OCLCQ |d AJS |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d SXB |d OCLCQ |d OCLCO | ||
019 | |a 180771782 |a 469636232 |a 476109849 |a 507273288 |a 607225291 |a 636862635 |a 636862641 |a 647695846 |a 933930950 |a 1035709273 |a 1066491791 |a 1109253109 | ||
020 | |a 9780127427515 | ||
020 | |a 0127427511 | ||
020 | |a 9780080535241 |q (electronic bk.) | ||
020 | |a 0080535240 |q (electronic bk.) | ||
035 | |a (OCoLC)162577586 |z (OCoLC)180771782 |z (OCoLC)469636232 |z (OCoLC)476109849 |z (OCoLC)507273288 |z (OCoLC)607225291 |z (OCoLC)636862635 |z (OCoLC)636862641 |z (OCoLC)647695846 |z (OCoLC)933930950 |z (OCoLC)1035709273 |z (OCoLC)1066491791 |z (OCoLC)1109253109 | ||
037 | |a 102587:102606 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
042 | |a dlr | ||
050 | 4 | |a QA76.73.J38 |b W445 2004eb | |
072 | 7 | |a COM |x 083000 |2 bisacsh | |
082 | 7 | |a 005.8/2 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Weiss, Jason |q (Jason R.) |1 https://id.oclc.org/worldcat/entity/E39PCjv6tjqQTRm9D7Q9MJKHVK |0 http://id.loc.gov/authorities/names/n2001009367 | |
245 | 1 | 0 | |a Java cryptography extensions : |b practical guide for programmers / |c Jason Weiss. |
260 | |a San Francisco, CA : |b Elsevier/Morgan Kaufmann, |c ©2004. | ||
300 | |a 1 online resource (xv, 158 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a The Practical Guides Ser. | |
520 | |a For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and its imperative that developers know what kinds of solutions exist. One of Javas solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few. In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesnt overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE. * Written by a seasoned veteran of both cryptography and server-side programming * Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates * Includes a companion web site that contains the code for the examples in the book, open-source cryptographic toolkits, and further resources | ||
505 | 0 | |a Chapter 1: Understanding Javas Cryptographic Architecture Chapter 2: Working with Symmetric Ciphers Chapter 3: Working with Asymmetric Ciphers and Key Agreement Protocols Chapter 4: Message Digests, Message Authentication Codes, and Digital Signatures Chapter 5: Managing Keys and Certificates Bibliography. | |
504 | |a Includes bibliographical references (pages 153-154) and index. | ||
588 | 0 | |a Print version record. | |
506 | |3 Use copy |f Restrictions unspecified |2 star |5 MiAaHDL | ||
533 | |a Electronic reproduction. |b [Place of publication not identified] : |c HathiTrust Digital Library, |d 2010. |5 MiAaHDL | ||
538 | |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |u http://purl.oclc.org/DLF/benchrepro0212 |5 MiAaHDL | ||
583 | 1 | |a digitized |c 2010 |h HathiTrust Digital Library |l committed to preserve |2 pda |5 MiAaHDL | |
650 | 0 | |a Java (Computer program language) |0 http://id.loc.gov/authorities/subjects/sh95008574 | |
650 | 0 | |a Cryptography. | |
650 | 6 | |a Java (Langage de programmation) | |
650 | 6 | |a Cryptographie. | |
650 | 7 | |a COMPUTERS |x Security |x Cryptography. |2 bisacsh | |
650 | 7 | |a Cryptography |2 fast | |
650 | 7 | |a Java (Computer program language) |2 fast | |
758 | |i has work: |a Java cryptography extensions (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFJGpkJvqVDBgRWDHvGbVC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Weiss, Jason. |t Java cryptography extensions. |d San Francisco, CA : Elsevier/Morgan Kaufmann, ©2004 |z 0127427511 |z 9780127427515 |w (DLC) 2003070900 |w (OCoLC)54007135 |
830 | 0 | |a Practical Guides Ser. | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=210141 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9780127427515 |3 Volltext |
938 | |a 123Library |b 123L |n 39228 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL317069 | ||
938 | |a ebrary |b EBRY |n ebr10206423 | ||
938 | |a EBSCOhost |b EBSC |n 210141 | ||
938 | |a YBP Library Services |b YANK |n 2729817 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn162577586 |
---|---|
_version_ | 1816881651621298176 |
adam_text | |
any_adam_object | |
author | Weiss, Jason (Jason R.) |
author_GND | http://id.loc.gov/authorities/names/n2001009367 |
author_facet | Weiss, Jason (Jason R.) |
author_role | |
author_sort | Weiss, Jason |
author_variant | j w jw |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.73.J38 W445 2004eb |
callnumber-search | QA76.73.J38 W445 2004eb |
callnumber-sort | QA 276.73 J38 W445 42004EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Chapter 1: Understanding Javas Cryptographic Architecture Chapter 2: Working with Symmetric Ciphers Chapter 3: Working with Asymmetric Ciphers and Key Agreement Protocols Chapter 4: Message Digests, Message Authentication Codes, and Digital Signatures Chapter 5: Managing Keys and Certificates Bibliography. |
ctrlnum | (OCoLC)162577586 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06289cam a2200661 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn162577586</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">070806s2004 caua ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OPELS</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">OPELS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCE</subfield><subfield code="d">ZCU</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">MERUC</subfield><subfield code="d">EBLCP</subfield><subfield code="d">UKDOC</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UMI</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">DEBBG</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">180771782</subfield><subfield code="a">469636232</subfield><subfield code="a">476109849</subfield><subfield code="a">507273288</subfield><subfield code="a">607225291</subfield><subfield code="a">636862635</subfield><subfield code="a">636862641</subfield><subfield code="a">647695846</subfield><subfield code="a">933930950</subfield><subfield code="a">1035709273</subfield><subfield code="a">1066491791</subfield><subfield code="a">1109253109</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780127427515</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0127427511</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080535241</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080535240</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162577586</subfield><subfield code="z">(OCoLC)180771782</subfield><subfield code="z">(OCoLC)469636232</subfield><subfield code="z">(OCoLC)476109849</subfield><subfield code="z">(OCoLC)507273288</subfield><subfield code="z">(OCoLC)607225291</subfield><subfield code="z">(OCoLC)636862635</subfield><subfield code="z">(OCoLC)636862641</subfield><subfield code="z">(OCoLC)647695846</subfield><subfield code="z">(OCoLC)933930950</subfield><subfield code="z">(OCoLC)1035709273</subfield><subfield code="z">(OCoLC)1066491791</subfield><subfield code="z">(OCoLC)1109253109</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">102587:102606</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="042" ind1=" " ind2=" "><subfield code="a">dlr</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.73.J38</subfield><subfield code="b">W445 2004eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">083000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Weiss, Jason</subfield><subfield code="q">(Jason R.)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjv6tjqQTRm9D7Q9MJKHVK</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2001009367</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Java cryptography extensions :</subfield><subfield code="b">practical guide for programmers /</subfield><subfield code="c">Jason Weiss.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">San Francisco, CA :</subfield><subfield code="b">Elsevier/Morgan Kaufmann,</subfield><subfield code="c">©2004.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xv, 158 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">The Practical Guides Ser.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and its imperative that developers know what kinds of solutions exist. One of Javas solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few. In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesnt overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE. * Written by a seasoned veteran of both cryptography and server-side programming * Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates * Includes a companion web site that contains the code for the examples in the book, open-source cryptographic toolkits, and further resources</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1: Understanding Javas Cryptographic Architecture Chapter 2: Working with Symmetric Ciphers Chapter 3: Working with Asymmetric Ciphers and Key Agreement Protocols Chapter 4: Message Digests, Message Authentication Codes, and Digital Signatures Chapter 5: Managing Keys and Certificates Bibliography.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 153-154) and index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="3">Use copy</subfield><subfield code="f">Restrictions unspecified</subfield><subfield code="2">star</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction.</subfield><subfield code="b">[Place of publication not identified] :</subfield><subfield code="c">HathiTrust Digital Library,</subfield><subfield code="d">2010.</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.</subfield><subfield code="u">http://purl.oclc.org/DLF/benchrepro0212</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="583" ind1="1" ind2=" "><subfield code="a">digitized</subfield><subfield code="c">2010</subfield><subfield code="h">HathiTrust Digital Library</subfield><subfield code="l">committed to preserve</subfield><subfield code="2">pda</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Java (Computer program language)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh95008574</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Java (Langage de programmation)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cryptographie.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">Cryptography.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Java (Computer program language)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Java cryptography extensions (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFJGpkJvqVDBgRWDHvGbVC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Weiss, Jason.</subfield><subfield code="t">Java cryptography extensions.</subfield><subfield code="d">San Francisco, CA : Elsevier/Morgan Kaufmann, ©2004</subfield><subfield code="z">0127427511</subfield><subfield code="z">9780127427515</subfield><subfield code="w">(DLC) 2003070900</subfield><subfield code="w">(OCoLC)54007135</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Practical Guides Ser.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=210141</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9780127427515</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">123Library</subfield><subfield code="b">123L</subfield><subfield code="n">39228</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL317069</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10206423</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">210141</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2729817</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn162577586 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:07Z |
institution | BVB |
isbn | 9780127427515 0127427511 9780080535241 0080535240 |
language | English |
oclc_num | 162577586 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xv, 158 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Elsevier/Morgan Kaufmann, |
record_format | marc |
series | Practical Guides Ser. |
series2 | The Practical Guides Ser. |
spelling | Weiss, Jason (Jason R.) https://id.oclc.org/worldcat/entity/E39PCjv6tjqQTRm9D7Q9MJKHVK http://id.loc.gov/authorities/names/n2001009367 Java cryptography extensions : practical guide for programmers / Jason Weiss. San Francisco, CA : Elsevier/Morgan Kaufmann, ©2004. 1 online resource (xv, 158 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier The Practical Guides Ser. For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and its imperative that developers know what kinds of solutions exist. One of Javas solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few. In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesnt overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE. * Written by a seasoned veteran of both cryptography and server-side programming * Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates * Includes a companion web site that contains the code for the examples in the book, open-source cryptographic toolkits, and further resources Chapter 1: Understanding Javas Cryptographic Architecture Chapter 2: Working with Symmetric Ciphers Chapter 3: Working with Asymmetric Ciphers and Key Agreement Protocols Chapter 4: Message Digests, Message Authentication Codes, and Digital Signatures Chapter 5: Managing Keys and Certificates Bibliography. Includes bibliographical references (pages 153-154) and index. Print version record. Use copy Restrictions unspecified star MiAaHDL Electronic reproduction. [Place of publication not identified] : HathiTrust Digital Library, 2010. MiAaHDL Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL Java (Computer program language) http://id.loc.gov/authorities/subjects/sh95008574 Cryptography. Java (Langage de programmation) Cryptographie. COMPUTERS Security Cryptography. bisacsh Cryptography fast Java (Computer program language) fast has work: Java cryptography extensions (Text) https://id.oclc.org/worldcat/entity/E39PCFJGpkJvqVDBgRWDHvGbVC https://id.oclc.org/worldcat/ontology/hasWork Print version: Weiss, Jason. Java cryptography extensions. San Francisco, CA : Elsevier/Morgan Kaufmann, ©2004 0127427511 9780127427515 (DLC) 2003070900 (OCoLC)54007135 Practical Guides Ser. FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=210141 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9780127427515 Volltext |
spellingShingle | Weiss, Jason (Jason R.) Java cryptography extensions : practical guide for programmers / Practical Guides Ser. Chapter 1: Understanding Javas Cryptographic Architecture Chapter 2: Working with Symmetric Ciphers Chapter 3: Working with Asymmetric Ciphers and Key Agreement Protocols Chapter 4: Message Digests, Message Authentication Codes, and Digital Signatures Chapter 5: Managing Keys and Certificates Bibliography. Java (Computer program language) http://id.loc.gov/authorities/subjects/sh95008574 Cryptography. Java (Langage de programmation) Cryptographie. COMPUTERS Security Cryptography. bisacsh Cryptography fast Java (Computer program language) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh95008574 |
title | Java cryptography extensions : practical guide for programmers / |
title_auth | Java cryptography extensions : practical guide for programmers / |
title_exact_search | Java cryptography extensions : practical guide for programmers / |
title_full | Java cryptography extensions : practical guide for programmers / Jason Weiss. |
title_fullStr | Java cryptography extensions : practical guide for programmers / Jason Weiss. |
title_full_unstemmed | Java cryptography extensions : practical guide for programmers / Jason Weiss. |
title_short | Java cryptography extensions : |
title_sort | java cryptography extensions practical guide for programmers |
title_sub | practical guide for programmers / |
topic | Java (Computer program language) http://id.loc.gov/authorities/subjects/sh95008574 Cryptography. Java (Langage de programmation) Cryptographie. COMPUTERS Security Cryptography. bisacsh Cryptography fast Java (Computer program language) fast |
topic_facet | Java (Computer program language) Cryptography. Java (Langage de programmation) Cryptographie. COMPUTERS Security Cryptography. Cryptography |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=210141 https://www.sciencedirect.com/science/book/9780127427515 |
work_keys_str_mv | AT weissjason javacryptographyextensionspracticalguideforprogrammers |