000 02212cam a2200409 i 4500
001 13937045
003 OSt
005 20230531141745.0
008 050420s2005 inua b 001 0 eng d
010 _a 2005011272
020 _a9788126506262
_qpaperback
020 _a9780764596339
_qpaperback
040 _aDLC
_beng
_cDLC
_dDLC
_dEG-CaTKH
_erda
042 _apcc
050 0 0 _aQA76.9.A25
_bH645 2005
082 0 0 _a005.8 HO.B 2005 G.C
_223
100 1 _aHook, David,
_d1962-
_eauthor.
245 1 0 _aBeginning cryptography with Java /
_cDavid Hook.
264 1 _aIndianapolis, IN :
_bWiley Publishing,
_c2005.
300 _axxxii, 448 pages :
_billustrations ;
_c24 cm.
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
440 0 _aProgrammer to programmer
504 _aIncludes bibliographical references and index.
505 0 _aThe JCA and the JCE -- Symmetric key cryptography -- Message digests, MACs, and HMACs -- Asymmetric key cryptography -- Object description in cryptography using ASN. 1 -- Distinguished names and certificates -- Certificate revocation and path validation -- Key and certificate management using keystores -- CMS and S/MIME -- SSL and TLS -- Appendix A: Solutions To exercises -- Appendix B: Algorithms provided by the Bouncy Castle provider -- Appendix C: Using the Bouncy Castle API for elliptic curve -- Appendix D: Bibliography and further reading.
520 _a"This book is for Java developers who want to use cryptography in their applications or to understand how cryptography is being used in Java applications. Knowledge of the Java language is necessary, but you need not be familiar with any of the APIs discussed."--Jacket.
650 0 _aComputer security.
650 0 _aCryptography.
650 0 _aPublic key infrastructure (Computer security)
650 0 _aJava (Computer program language)
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK
998 _ayomna.nassar
_bP
_d20230531
998 _amona.romia
_bR
_d20230531
999 _c681
_d681