0

My Bag

0.00

Download App

Beginning Cryptography With Java 11.0%OFF

Beginning Cryptography With Java

by David Hook

  • ISBN

    :  

    9788126506262

  • Publisher

    :  

    Wiley India Pvt Ltd.

  • Subject

    :  

    Computer Programming / Software Development, Computer Security

  • Binding

    :  

    paperback

  • Pages

    :  

    448

  • Year

    :  

    2005

429.0

11.0% OFF

381.0

Buy Now

Shipping charges are applicable for books below Rs. 101.0

View Details

Estimated Shipping Time : 5-7 Business Days

View Details

Share it on

  • Description

    The book tells the reader how to understand and use JCE, JCA, and the JSSE for encryption and authentication. It walks the reader through how padding mechanisms work in ciphers, as well as spot and fix typical errors. The book also provides an understanding of how authentication mechanisms can be implemented in Java and why they are used. Through this text, the reader can easily understand how certificates are constructed, how to use the to generate certificates, validate certificate chains, create private credential objects which can be sensibly imported into other vendor products, as well understand how protocols like Cryptographic Message Syntax (CMS, or PKCS 7), S/MIME and SSL work. Special Feature Exclusive coverage: This is the only book that provides programmers with specific need-to-know crypto so they can understand, build, debug, and maintain e-business web applications Delivers on Programmer to Programmer promise Website: code examples, and working Java examples, along with the popular Bouncycastle libraries will be provided free with the book to facilitate the try-it-out feature Provides the security companion to WROX Java and open source books: A programmer can use Beginning Cryptography to create the secure applications being built using J2EE; open source programmers/developers know and use Java Author platform: as co-founder of Bouncycastle, the author will promote the book through Bouncycastle’s extensive mail list; the author is highly regarded in both the developer and security/cryptography area and will promote through the Java User Group and security user groups; the author will be an active wrox.com participant

  • Author Biography

    David Hook is currently a freelance consultant, often serving as lead. He is cofounder of Bouncycastle, the highly regarded open source security site, has deep knowledge of cryptography and security, and teaches programming and security in the C/S dept at RMIT University in Melbourne, Australia. He has worked with java since 1995 and has been actively involved is using and developing cryptographic APIs in Java for the last 8 years. Table of Contents Acknowledgments Introduction Chapter 1: The JCA and the JCE Chapter 2: Symmetric Key Cryptography Chapter 3: Message Digests, MACs, and HMACs Chapter 4: Asymmetric Key Cryptography Chapter 5: Object Description in Cryptography Using ASN.1 Chapter 6: Distinguished Names and Certificates Chapter 7: Certificate Revocation and Path Validation Chapter 8: Key and Certificate Management Using Keystores Chapter 9: CMS and S/MIME Chapter 10: SSL and TLS Appendix A: Solutions to Exercises Appendix B: Algorithms Provided by the Bouncy Castle Provider Appendix C: Using the Bouncy Castle API for Elliptic Curve Appendix D: Bibliography and Further Reading Index

Related Items

-

of

  • OFFER

    ASP.NET: Developer's Guide

    Greg Buczek

    Starts At

    877.0

    1070.0

    18% OFF

  • OFFER

    Visual C++ Programming

    Yashavant P. Kanetkar

    Starts At

    288.0

    390.0

    26% OFF

  • Integrated Telecommunications Management Solutions

    Graham Chen

    Starts At

    11558.0

  • Modeling and Asynchronous Distributed Simulation: Analyzing Complex Systems

    Sumit Ghosh

    Starts At

    795.0

  • OFFER

    WritingBetter Requirements

    Ian Alexander

    Starts At

    8252.0

    9596.0

    14% OFF

  • OFFER

    Designing Concurrent, Distributed, and Real-Time Applications with UML

    Hassan Gomaa

    Starts At

    6079.0

    7999.0

    24% OFF

  • OFFER

    An Introduction to Distributed Algorithms

    Valmir C. Barbosa

    Starts At

    521.0

    695.0

    25% OFF

  • OFFER

    An Introduction to Neural Networks

    James A. Anderson

    Starts At

    8427.0

    11089.0

    24% OFF

  • OFFER

    Theoretical Aspects of Object-Oriented Programming: Types, Semantics, and Language Design (Foundations of Computing)

    Carl A. Gunter

    Starts At

    12973.0

    15085.0

    14% OFF

  • OFFER

    Artificial Life VII: Proceedings of the Seventh International Conference on Artificial Life (Complex Adaptive Systems)

    Mark Bedau

    Starts At

    6602.0

    7677.0

    14% OFF

© 2016, All rights are reserved.

Subscribe to Our Newsletter

 

Are you sure you want to remove the item from your Bag?

Yes

No

Added to Your Wish List

OK

Your Shopping Bag

- 1 Item

null

Item

Delivery

Unit Price

Quantity

Sub Total

Shipping Charges : 0.0 Total Savings        : Grand Total :

Order Summary