
Download App
>> | LShop | >> | Book | >> | Computing & Informat... | >> | Computer Programming... | >> | Beginning Cryptograp... |
ISBN
:
9788126506262
Publisher
:
Wiley India Pvt Ltd.
Subject
:
Computer Programming / Software Development, Computer Security
Binding
:
paperback
Pages
:
448
Year
:
2005
₹
429.0
₹
381.0
Buy Now
Shipping charges are applicable for books below Rs. 101.0
View DetailsEstimated Shipping Time : 5-7 Business Days
View DetailsDescription
The book tells the reader how to understand and use JCE, JCA, and the JSSE for encryption and authentication. It walks the reader through how padding mechanisms work in ciphers, as well as spot and fix typical errors. The book also provides an understanding of how authentication mechanisms can be implemented in Java and why they are used. Through this text, the reader can easily understand how certificates are constructed, how to use the to generate certificates, validate certificate chains, create private credential objects which can be sensibly imported into other vendor products, as well understand how protocols like Cryptographic Message Syntax (CMS, or PKCS 7), S/MIME and SSL work. Special Feature Exclusive coverage: This is the only book that provides programmers with specific need-to-know crypto so they can understand, build, debug, and maintain e-business web applications Delivers on Programmer to Programmer promise Website: code examples, and working Java examples, along with the popular Bouncycastle libraries will be provided free with the book to facilitate the try-it-out feature Provides the security companion to WROX Java and open source books: A programmer can use Beginning Cryptography to create the secure applications being built using J2EE; open source programmers/developers know and use Java Author platform: as co-founder of Bouncycastle, the author will promote the book through Bouncycastle’s extensive mail list; the author is highly regarded in both the developer and security/cryptography area and will promote through the Java User Group and security user groups; the author will be an active wrox.com participant
Author Biography
David Hook is currently a freelance consultant, often serving as lead. He is cofounder of Bouncycastle, the highly regarded open source security site, has deep knowledge of cryptography and security, and teaches programming and security in the C/S dept at RMIT University in Melbourne, Australia. He has worked with java since 1995 and has been actively involved is using and developing cryptographic APIs in Java for the last 8 years. Table of Contents Acknowledgments Introduction Chapter 1: The JCA and the JCE Chapter 2: Symmetric Key Cryptography Chapter 3: Message Digests, MACs, and HMACs Chapter 4: Asymmetric Key Cryptography Chapter 5: Object Description in Cryptography Using ASN.1 Chapter 6: Distinguished Names and Certificates Chapter 7: Certificate Revocation and Path Validation Chapter 8: Key and Certificate Management Using Keystores Chapter 9: CMS and S/MIME Chapter 10: SSL and TLS Appendix A: Solutions to Exercises Appendix B: Algorithms Provided by the Bouncy Castle Provider Appendix C: Using the Bouncy Castle API for Elliptic Curve Appendix D: Bibliography and Further Reading Index
Related Items
-
of
Designing Concurrent, Distributed, and Real-Time Applications with UML
Hassan Gomaa
Starts At
6079.0
7999.0
24% OFF
Theoretical Aspects of Object-Oriented Programming: Types, Semantics, and Language Design (Foundations of Computing)
Carl A. Gunter
Starts At
12973.0
15085.0
14% OFF
Artificial Life VII: Proceedings of the Seventh International Conference on Artificial Life (Complex Adaptive Systems)
Mark Bedau
Starts At
6602.0
7677.0
14% OFF
Are you sure you want to remove the item from your Bag?
Yes
No
Added to Your Wish List
OK
Your Shopping Bag
- 1 Item
Item
Delivery
Unit Price
Quantity
Sub Total
Order Summary