Beginning cryptography with Java / David Hook.
Material type: TextSeries: Programmer to programmerPublisher: Indianapolis, IN : Wiley Publishing, 2005Description: xxxii, 448 pages : illustrations ; 24 cmContent type:- text
- unmediated
- volume
- 9788126506262
- 9780764596339
- 005.8 HO.B 2005 G.C 23
- QA76.9.A25 H645 2005
Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Books | The Knowledge Hub Library | Gift collections | 005.8 HO.B 2005 G.C (Browse shelf(Opens below)) | Available | 191619 |
Browsing The Knowledge Hub Library shelves, Collection: Gift collections Close shelf browser (Hides shelf browser)
005.8 CO.C 2004 G.C Cryptography for dummies / | 005.8 CO.N 2003 G.C Network security for dummies / | 005.8 DU.C 2009 G.C CompTIA security+ study guide / | 005.8 HO.B 2005 G.C Beginning cryptography with Java / | 005.8 JA.C 2008 G.C Crimeware : understanding new attacks and defenses / | 005.8 JO.R 2006 G.C Real digital forensics : computer security and incident response / | 005.8 KE.N 2009 G.C Network access control for dummies / |
Includes bibliographical references and index.
The JCA and the JCE -- Symmetric key cryptography -- Message digests, MACs, and HMACs -- Asymmetric key cryptography -- Object description in cryptography using ASN. 1 -- Distinguished names and certificates -- Certificate revocation and path validation -- Key and certificate management using keystores -- CMS and S/MIME -- SSL and TLS -- Appendix A: Solutions To exercises -- Appendix B: Algorithms provided by the Bouncy Castle provider -- Appendix C: Using the Bouncy Castle API for elliptic curve -- Appendix D: Bibliography and further reading.
"This book is for Java developers who want to use cryptography in their applications or to understand how cryptography is being used in Java applications. Knowledge of the Java language is necessary, but you need not be familiar with any of the APIs discussed."--Jacket.
There are no comments on this title.