Java Cryptography Extensions :Practical Guide for Programmers ( The Practical Guides )

Publication subTitle :Practical Guide for Programmers

Publication series :The Practical Guides

Author: Weiss   Jason R.  

Publisher: Elsevier Science‎

Publication year: 2004

E-ISBN: 9780080535241

P-ISBN(Paperback): 9780127427515

P-ISBN(Hardback):  9780127427515

Subject: TP309 安全保密;TP312 程序语言、算法语言

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM

For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and it’s imperative that developers know what kinds of solutions exist.

One of Java’s solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few.

In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesn’t overwhelm by packing in det

Chapter

Front Cover

pp.:  1 – 4

Copyright Page

pp.:  5 – 8

Contents

pp.:  8 – 12

Preface

pp.:  12 – 18

Chapter 1. Understanding Java's Cryptographic Architecture

pp.:  18 – 46

Chapter 2. Working with Symmetric Ciphers

pp.:  46 – 84

Chapter 3. Working with Asymmetric Ciphers and Key Agreement Protocols

pp.:  84 – 118

Chapter 4. Message Digests, Message Authentication Codes, and Digital Signatures

pp.:  118 – 136

Chapter 5. Managing Keys and Certificates

pp.:  136 – 170

Bibliography

pp.:  170 – 172

Index

pp.:  172 – 178

The users who browse this book also browse