
Cryptographic Libraries for Developers
Ed Moyle, Diana Kelley - Collection Programming Series
Résumé
Learn to Use the Right Cryptography Library Everytime!
No longer is it an option for software to include cryptography; everyone from office suites to accounting software and eCommerce Web sites use it. So today's developers have to know how to write software that includes cryptographic functionality. Although they are usually familiar with the basics of cryptography, they are not always familiar enough with the available products to select the right API/library and get up and running with it quickly.
Cryptographic Libraries for Developers teaches developers about the available APIs and helps them select the right ones for their projects based on platform, language, and regulatory requirements. The book serves as a nuts and bolts guide to writing software using these libraries and provides abundant examples and detailed examples throughout. The libraries covered include OpenSSL, B/Safe, the Java Cryptographic Library (JCE,) as sign/verify, encrypt/decrypt (asymmetric and symmetric,) MACs, and Hashing, as well as higher-level primitives such as X.509 digital certificates and secure (SSL) communications.
Key Features
- Provides a practical guide that teaches developers how to rapidly write and deploy applications requiring cryptography
- Covers the five common cryptography libraries: OpenSSL, B/Safe, the Java Cryptographic Library (JCE), and CAPI
- Teaches developers how to write security features for commercial software
- Includes a CD-ROM with all of the features and source code from the book
On the CD
- Code Snippets: The snippets of examples source code used throughout this book are included on this CD-ROM within their broader context
- Example Applications: Example frameworks and applications developed using the techniques, libraries, and strategies described within this book. Included as well are any and all design diagrams used in the preparation of the examples
L'auteur - Ed Moyle
Ed Moyle is a Founding Partner at Security Curve, an information security services company, providing strategy, consulting, and solutions to its clients. Prior to joining Security Curve, Ed was Vice President and Information Security Officer for Merrill Lynch Investment Managers (MLIM), where he was responsible for coordinating all aspects of information security within the business unit and developed firm-wide cryptographic solutions for secure data transfer, secure key management, authentication, and data integrity.
L'auteur - Diana Kelley
Diana Kelley is the Executive Security Advisor for Computer Associates's eTrust business unit of security management solutions. She speaks frequently at various industry conferences and has contributed articles to SC Magazine, CNET, The Journal of Network and System Management, Security Focus, inFocus, and Security Products Magazine.
Sommaire
- Acknowledgments
- Introducing
- Security Concepts Developer Overview
- Cryptographic Engineering
- Basic Techniques (by Example)
- Implementation Choices
- Application Development Strategies
- Developing with OpenSSL
- Developing with CAPI
- Developing with JCA/JCE
- Developing with BSAFE
- Example Applications
- About the CD-ROM
- Glossary
- Index
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Charles River Media |
Auteur(s) | Ed Moyle, Diana Kelley |
Collection | Programming Series |
Parution | 15/12/2005 |
Nb. de pages | 464 |
Format | 18,5 x 23,5 |
Couverture | Broché |
Poids | 819g |
Intérieur | Noir et Blanc |
EAN13 | 9781584504092 |
ISBN13 | 978-1-58450-409-2 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Développement d'applications
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet