Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Years
Person/Organisation
  • 1
    Online Resource
    Online Resource
    San Francisco, CA :Elsevier/Morgan Kaufmann,
    UID:
    almahu_9948025925902882
    Format: 1 online resource (177 p.)
    ISBN: 1-281-03377-4 , 9786611033774 , 0-08-053524-0
    Series Statement: The Practical Guides
    Content: For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBMFor many Java developers and software engineers, cryptography is an ""on-demand"" programming exercise, where cryptographi
    Note: Description based upon print version of record. , Front Cover; Java Cryptography Extensions: Practical Guide for Programmers; Copyright Page; Contents; Preface; Chapter 1. Understanding Java's Cryptographic Architecture; 1.1 Java and Cryptography; 1.2 Java Cryptography Architecture; 1.3 Java Cryptography Extension (JCE); 1.4 Understanding the Service Provider Interface Architecture; 1.5 Installing Providers; 1.6 JCA Helper Classes; 1.7 Working with Jurisdiction Policy Files; Chapter 2. Working with Symmetric Ciphers; 2.1 Random Number Generation; 2.2 The SecureRandom Engine; 2.3 The KeyGenerator Engine; 2.4 Avoiding Opaque Keys , 2.5 Categorizing Symmetric Ciphers2.6 Padding and Cipher Modes; 2.7 The Cipher Engine; 2.8 Password Based Encryption; 2.9 Bringing Order to Chaos: Picking a Cipher; Chapter 3. Working with Asymmetric Ciphers and Key Agreement Protocols; 3.1 The KeyPairGenerator Engine; 3.2 Revisiting the Cipher Engine; 3.3 Comparing Keys for Equality; 3.4 Looking to the Future: Elliptic Curve Cryptography; 3.5 The KeyAgreement Engine; Chapter 4. Message Digests, Message Authentication Codes, and Digital Signatures; 4.1 Choosing a Message Digest Algorithm; 4.2 The MessageDigest Engine; 4.3 The Mac Engine , 4.4 Digital Signatures4.5 The Signature Engine; Chapter 5. Managing Keys and Certificates; 5.1 The Need for Key Management; 5.2 Digital Certificates Defined; 5.3 The KeyStore Engine; 5.4 The CertificateFactory Engine; 5.5 Conclusion; Bibliography; Index , English
    Additional Edition: ISBN 0-12-742751-1
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Book
    Book
    Amsterdam [u.a.] : Elsevier/Morgan Kaufmann
    UID:
    b3kat_BV023695420
    Format: XV, 158 S. , Ill. , 24 cm
    ISBN: 0127427511
    Series Statement: The Morgan Kaufmann practical guides series
    Language: Undetermined
    Keywords: Java ; Kryptologie
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Book
    Book
    San Francisco : Morgan Kaufmann
    UID:
    kobvindex_ZLB13710350
    Format: XV, 158 Seiten , graph. Darst.
    ISBN: 0127427511
    Note: Text engl.
    Language: English
    Keywords: Java 〈Programmiersprache〉 ; Kryptologie
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 0127427503?
Did you mean 0127425101?
Did you mean 0127429611?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages