Bild 1 von 1

Galerie
Bild 1 von 1

Java Cryptography (Taschenbuch oder Softback)-
US $51,68
Ca.EUR 44,76
Artikelzustand:
Neu
Neues, ungelesenes, ungebrauchtes Buch in makellosem Zustand ohne fehlende oder beschädigte Seiten. Genauere Einzelheiten entnehmen Sie bitte dem Angebot des Verkäufers.
5 verfügbar
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Versand:
Kostenlos Standard Shipping.
Standort: Grand Rapids, Michigan, USA
Lieferung:
Lieferung zwischen Mi, 6. Aug und Di, 12. Aug nach 94104 bei heutigem Zahlungseingang
Rücknahme:
30 Tage Rückgabe. Kostenloser Rückversand.
Zahlungen:
Sicher einkaufen
- Gratis Rückversand im Inland
- Punkte für jeden Kauf und Verkauf
- Exklusive Plus-Deals
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:388678906098
Artikelmerkmale
- Artikelzustand
- EAN
- 9781565924024
- UPC
- 00636920924029
- ISBN
- 1565924029
- Manufacturer
- O'Reilly Media
- Brand
- O'Reilly Media
- Binding
- TP
- Book Title
- Java Cryptography
Über dieses Produkt
Product Identifiers
Publisher
O'reilly Media, Incorporated
ISBN-10
1565924029
ISBN-13
9781565924024
eBay Product ID (ePID)
234103
Product Key Features
Number of Pages
364 Pages
Publication Name
Java Cryptography
Language
English
Publication Year
1998
Subject
Programming / General, Communication Studies, Programming Languages / Java, Programming / Object Oriented
Type
Textbook
Subject Area
Computers, Language Arts & Disciplines
Series
Java Ser.
Format
Trade Paperback
Dimensions
Item Height
0.7 in
Item Weight
20.8 Oz
Item Length
9.2 in
Item Width
7 in
Additional Product Features
Intended Audience
Scholarly & Professional
LCCN
00-500283
Dewey Edition
21
Illustrated
Yes
Dewey Decimal
005.82
Table Of Content
Preface; Who Are You?; About This Book; What's Not in This Book; About the Examples; Font Conventions; Request for Comments; Acknowledgments;Chapter 1: Introduction; 1.1 Secure Systems; 1.2 Cryptography; 1.3 Platform Security; 1.4 Astute Inequalities; 1.5 Hello, zoT1wy1njA0=!;Chapter 2: Concepts; 2.1 Confidentiality; 2.2 Integrity; 2.3 Authentication; 2.4 Random Numbers; 2.5 Algorithms;Chapter 3: Architecture; 3.1 Alphabet Soup; 3.2 Concept Classes; 3.3 API and SPI; 3.4 Factory Methods; 3.5 Standard Names; 3.6 The Provider Architecture; 3.7 Key Management; 3.8 Summary;Chapter 4: Random Numbers; 4.1 SecureRandom; 4.2 Self-Seeding; 4.3 Keyboard Timing; 4.4 SeederDialog;Chapter 5: Key Management; 5.1 Keys; 5.2 Key Generators; 5.3 Key Translators; 5.4 Key Agreement; 5.5 The Identity Key Management Paradigm; 5.6 The KeyStore Key Management Paradigm;Chapter 6: Authentication; 6.1 Message Digests; 6.2 MACs; 6.3 Signatures; 6.4 Certificates;Chapter 7: Encryption; 7.1 Streams and Blocks; 7.2 Block Ciphers; 7.3 Algorithms; 7.4 javax.crypto.Cipher; 7.5 Cipher's Close Relatives; 7.6 Passphrase Encryption; 7.7 Inside Cipher; 7.8 Hybrid Systems;Chapter 8: Signed Applets; 8.1 Renegade; 8.2 HotJava; 8.3 Navigator; 8.4 Internet Explorer; 8.5 Summary;Chapter 9: Writing a Provider; 9.1 Getting Started; 9.2 Adding the ElGamal Classes; 9.3 ElGamal; 9.4 Generating Keys; 9.5 Signature; 9.6 Cipher;Chapter 10: SafeTalk; 10.1 Using SafeTalk; 10.2 Under the Hood;Chapter 11: CipherMail; 11.1 Using CipherMail; 11.2 Under the Hood;Chapter 12: Outside the Box; 12.1 Application Design; 12.2 Decompilers and Bytecode Obfuscation; 12.3 Endpoint Security; 12.4 File Security; 12.5 Network Security; 12.6 Summary;BigInteger;Base64;JAR; Creating; Extracting; The Manifest; Signing;Javakey; Creating; Inspecting; Gimme the Keys...; Certificates; To and Fro; Sign of the Times; The Care and Feeding of Keys;Quick Reference; Package java.security; Package java.security.cert; Package java.security.interfaces; Package java.security.spec; Package javax.crypto; Package javax.crypto.interfaces; Package javax.crypto.spec;Colophon;
Synopsis
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with.This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java Cryptography Architecture (JCA). Another set of classes, the Java Cryptography Extension (JCE), provides additional cryptographic functionality. This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards.The book is designed for moderately experienced Java programmers who want to learn how to build cryptography into their applications. No prior knowledge of cryptography is assumed. The book is peppered with useful examples, ranging from simple demonstrations in the first chapter to full-blown applications in later chapters.Topics include: The Java Cryptography Architecture (JCA) The Java Cryptography Extension (JCE) Cryptographic providers The Sun key management tools Message digests, digital signatures, and certificates (X509v3) Block and stream ciphers Implementations of the ElGamal signature and cipher algorithms A network talk application that encrypts all data sent over the network An email application that encrypts its messages Covers JDK 1.2 and JCE 1.2., Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with. This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java Cryptography Architecture (JCA). Another set of classes, the Java Cryptography Extension (JCE), provides additional cryptographic functionality. This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards. The book is designed for moderately experienced Java programmers who want to learn how to build cryptography into their applications. No prior knowledge of cryptography is assumed. The book is peppered with useful examples, ranging from simple demonstrations in the first chapter to full-blown applications in later chapters. Topics include: The Java Cryptography Architecture (JCA) The Java Cryptography Extension (JCE) Cryptographic providers The Sun key management tools Message digests, digital signatures, and certificates (X509v3) Block and stream ciphers Implementations of the ElGamal signature and cipher algorithms A network talk application that encrypts all data sent over the network An email application that encrypts its messages Covers JDK 1.2 and JCE 1.2., Java Cryptography teaches you how to write secure programs using Java's cryptographic tools. It thoroughly discusses the java.security package and the Java Cryptography Extensions (JCE), showing you how to use security providers and even how to implement your own provider. It covers authentication, key management, and public and private key encryption and includes a secure talk application that encrypts all data sent over the network. If you work with sensitive data, you'll find this book indispensable., "Java Cryptology" teaches you how to write secure programs using Java's cryptographic tools. It thoroughly discusses the Java security package and the Java Cryptography Extensions (JCE), showing you how to use security providers and even how to implement your own provider. If you work with sensitive data, you'll find this book indispensable.
LC Classification Number
QA76.73.J38K59 1999
Artikelbeschreibung des Verkäufers
Rechtliche Informationen des Verkäufers
Info zu diesem Verkäufer
Bargain Book Stores
99,2% positive Bewertungen•3,2 Mio. Artikel verkauft
Angemeldet als gewerblicher Verkäufer
Verkäuferbewertungen (1.268.290)
- 7***j (780)- Bewertung vom Käufer.Letzter MonatBestätigter KaufI recently purchased an item from this eBay seller, and I couldn't be happier with the experience. From the prompt communication to the fast shipping, everything was handled with utmost professionalism. The item arrived exactly as described and was well-packaged to ensure its safety during transit. The seller was courteous and responsive, making the entire transaction smooth and hassle-free. I highly recommend this seller to anyone looking for quality products and excellent service.
- 6***c (458)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufThe items were just as shown and in excellent condition. The books were very well packed for shipping. I will continue to do business with the seller. The prices are reasonable and the shipping cost are very good. The seller is great at communicating with the buyers keeping the parties well informed about the tranactions. Highly recommended! A+++++++
- e***- (86)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufFantastic experience all around! The transaction was fast and easy, with smooth communication every step of the way. The item arrived quickly, was securely packaged, and matched the description perfectly. Seller was responsive, helpful, and clearly cares about providing great service. One of the best eBay sellers I’ve had the pleasure of dealing with. 10 out of 10—highly recommended! Would absolutely buy from again without hesitation. Thanks so much!The Jewish War of Survival (Paperback or Softback) (Nr. 365451036486)
Noch mehr entdecken:
- Natur-Taschenbücher,
- Brockhaus Taschenbücher,
- Frauenliteratur-Taschenbücher,
- Humor Taschenbücher,
- Taschenbücher über Architektur,
- Erotische Literatur Taschenbücher,
- Sonstige Bücher im Taschenbuch-Format,
- Autoatlanten im Taschenbuch-Format,
- Moderne Bücher im Taschenbuch Belletristik,
- Bücher im Taschenbuch Sachbuch Kräuter