Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Java Cryptography Extensions
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Java Cryptography Extensions

Java Cryptography Extensions

Practical Guide gor Programmers

Jason Weiss

158 pages, parution le 04/06/2004

Résumé

For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM

For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and it's imperative that developers know what kinds of solutions exist.

One of Java's solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few.

In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesn't overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE.

L'auteur - Jason Weiss

Jason Weiss: Sybase Inc., Dublin, CA

Sommaire

  • Understanding Java's Cryptographic Architecture
  • Working with Symmetric Ciphers
  • Working with Asymmetric Ciphers and Key Agreement Protocols
  • Message Digests, Message Authentication Codes, and Digital Signatures
  • Managing Keys and Certificates
Voir tout
Replier

Caractéristiques techniques

  PAPIER
Éditeur(s) Morgan Kaufmann
Auteur(s) Jason Weiss
Parution 04/06/2004
Nb. de pages 158
Format 19 x 23
Couverture Broché
Poids 375g
Intérieur Noir et Blanc
EAN13 9780127427515
ISBN13 978-0-12-742751-5

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav.client@eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription