Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Cryptography with Java

Buy
Beginning Cryptography with Java, 9780764596339 (0764596330), Wrox Press, 2005
Beginning Cryptography with Java

While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications—if you know how.

This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.

What you will learn from this book

  • How to understand and use JCE, JCA, and the JSSE for encryption and authentication
  • The ways in which padding mechanisms work in ciphers and how to spot and fix typical errors
  • An understanding of how authentication mechanisms are implemented in Java and why they are used
  • Methods for describing cryptographic objects with ASN.1
  • How to create certificate revocation lists and use the Online Certificate Status Protocol (OCSP)
  • Real-world Web solutions using Bouncy Castle APIs

Who this book is for

This book is for Java developers who want to use cryptography in their applications or to understand how cryptography is being used in Java applications. Knowledge of the Java language is necessary, but you need not be familiar with any of the APIs discussed.

Wrox Beginning guides are crafted to make learning programming languages and technologies easier than you think, providing a structured, tutorial format that will guide you through all the techniques involved.

About the Author
David Hook has been writing software in a variety of domains and languages for the last 20 years. He has worked with Java since 1995, originally doing medical imaging before moving into cryptography and security a year or so later. In April 2000, he co-founded the open source Bouncy Castle cryptography project and has played an active role in it ever since. He currently works as a freelance consultant, mainly in Java, doing the odd bit of lecturing and writing on the side. When he is not using his spare time to work on Bouncy Castle, he spends it pursuing his other interest in computer graphics. He lives in Melbourne, Australia, with his most patient wife Janine and a cat named Hamlet, who really seems to think he’s a little cryptographer in a fur coat. David can be reached at dgh@bund.com.au.

(HTML tags aren't allowed.)

Cracking the New GMAT, 2013 Edition: Revised and Updated for the New GMAT (Graduate School Test Preparation)
Cracking the New GMAT, 2013 Edition: Revised and Updated for the New GMAT (Graduate School Test Preparation)

If you need to know it for the next-generation GMAT, it’s in this book. Cracking the New GMAT, 2013 Edition has been completely revised and updated for the changes coming to the new GMAT in June 2012. It includes:
 
   • Access to 2 full-length practice tests
...

CCNA Routing and Switching Complete Review Guide: Exam 100-105, Exam 200-105, Exam 200-125
CCNA Routing and Switching Complete Review Guide: Exam 100-105, Exam 200-105, Exam 200-125

Tight, focused CCNA review covering all three exams

The CCNA Routing and Switching Complete Review Guide offers clear, concise review for Exams 100-105, 200-105, and 200-125. Written by best-selling certification author and Cisco guru Todd Lammle, this guide is your ideal resource for quick review and reinforcement of...

Data Communications Networking Devices: Operation, Utilization and Lan and Wan Internetworking, 4th Edition
Data Communications Networking Devices: Operation, Utilization and Lan and Wan Internetworking, 4th Edition
Data Communications Networking Devices Operation, Utilization and LAN and VAN Internetworking Fourth Edition Gilbert Held 4-Degree Consulting, Macon, Georgia, USA Data communications continue to grow enormously as a key part of telecommunications. Technological advances mean up-to-date information is essential. This fourth edition of the popular...

iPod Repair QuickSteps
iPod Repair QuickSteps
Get more life out of your iPod

Like every other electronic device, iPods break down. Until now, the prospect of repairing an iPod was daunting, if not nearly impossible for the average user. In this full-color, inexpensive guide, the owner of the fastest-growing chain of iPod repair shops in the U.S. shares the...

Test-Driven Development in Microsoft .NET
Test-Driven Development in Microsoft .NET

With the clarity and precision intrinsic to the Test-Driven Development (TDD) process itself, experts James Newkirk, and Alexei Vorontsov demonstrate how to implement TDD principles and practices to drive lean, efficient coding—and better design. The best way to understand TDD is to see it in action, and Newkirk and Vorontsov walk you...

Using Google App Engine
Using Google App Engine
With this book, you can build exciting, scalable web applications quickly and confidently, using Google App Engine -- even if you have little or no experience in programming or web development. App Engine is one of the most exciting web technologies to appear in the last year, providing a simple, easy-to-use application framework with basic web...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy