Amazon cover image
Image from Amazon.com

Beginning cryptography with Java / David Hook.

By: Material type: TextTextSeries: Programmer to programmerPublisher: Indianapolis, IN : Wiley Publishing, 2005Description: xxxii, 448 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9788126506262
  • 9780764596339
Subject(s): DDC classification:
  • 005.8 HO.B 2005 G.C 23
LOC classification:
  • QA76.9.A25 H645 2005
Contents:
The JCA and the JCE -- Symmetric key cryptography -- Message digests, MACs, and HMACs -- Asymmetric key cryptography -- Object description in cryptography using ASN. 1 -- Distinguished names and certificates -- Certificate revocation and path validation -- Key and certificate management using keystores -- CMS and S/MIME -- SSL and TLS -- Appendix A: Solutions To exercises -- Appendix B: Algorithms provided by the Bouncy Castle provider -- Appendix C: Using the Bouncy Castle API for elliptic curve -- Appendix D: Bibliography and further reading.
Summary: "This book is for Java developers who want to use cryptography in their applications or to understand how cryptography is being used in Java applications. Knowledge of the Java language is necessary, but you need not be familiar with any of the APIs discussed."--Jacket.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Books Books The Knowledge Hub Library Gift collections 005.8 HO.B 2005 G.C (Browse shelf(Opens below)) Available 191619

Includes bibliographical references and index.

The JCA and the JCE -- Symmetric key cryptography -- Message digests, MACs, and HMACs -- Asymmetric key cryptography -- Object description in cryptography using ASN. 1 -- Distinguished names and certificates -- Certificate revocation and path validation -- Key and certificate management using keystores -- CMS and S/MIME -- SSL and TLS -- Appendix A: Solutions To exercises -- Appendix B: Algorithms provided by the Bouncy Castle provider -- Appendix C: Using the Bouncy Castle API for elliptic curve -- Appendix D: Bibliography and further reading.

"This book is for Java developers who want to use cryptography in their applications or to understand how cryptography is being used in Java applications. Knowledge of the Java language is necessary, but you need not be familiar with any of the APIs discussed."--Jacket.

There are no comments on this title.

to post a comment.