語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Java cryptography extensions[electro...
~
ScienceDirect (Online service)
Java cryptography extensions[electronic resource] :practical guide for programmers /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
杜威分類號:
005.8/2
書名/作者:
Java cryptography extensions : practical guide for programmers // Jason Weiss.
作者:
Weiss, Jason.
出版者:
San Francisco, CA : : Elsevier/Morgan Kaufmann,, c2004.
面頁冊數:
xv, 158 p. : : ill. ;; 24 cm.
標題:
Java (Computer program language)
標題:
Cryptography.
ISBN:
9780127427515
ISBN:
0127427511
書目註:
Includes bibliographical references (p. 153-154) and index.
內容註:
Chapter 1: Understanding Javas Cryptographic Architecture Chapter 2: Working with Symmetric Ciphers Chapter 3: Working with Asymmetric Ciphers and Key Agreement Protocols Chapter 4: Message Digests, Message Authentication Codes, and Digital Signatures Chapter 5: Managing Keys and Certificates Bibliography.
摘要、提要註:
For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and its imperative that developers know what kinds of solutions exist. One of Javas solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few. In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesnt overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE. * Written by a seasoned veteran of both cryptography and server-side programming * Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates * Includes a companion web site that contains the code for the examples in the book, open-source cryptographic toolkits, and further resources.
電子資源:
An electronic book accessible through the World Wide Web; click for information
電子資源:
An electronic book accessible through the World Wide Web; click for information
電子資源:
http://www.loc.gov/catdir/toc/els051/2003070900.html
電子資源:
http://www.loc.gov/catdir/description/els041/2003070900.html
Java cryptography extensions[electronic resource] :practical guide for programmers /
Weiss, Jason.
Java cryptography extensions
practical guide for programmers /[electronic resource] :Jason Weiss. - San Francisco, CA :Elsevier/Morgan Kaufmann,c2004. - xv, 158 p. :ill. ;24 cm.
Includes bibliographical references (p. 153-154) and index.
Chapter 1: Understanding Javas Cryptographic Architecture Chapter 2: Working with Symmetric Ciphers Chapter 3: Working with Asymmetric Ciphers and Key Agreement Protocols Chapter 4: Message Digests, Message Authentication Codes, and Digital Signatures Chapter 5: Managing Keys and Certificates Bibliography.
For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and its imperative that developers know what kinds of solutions exist. One of Javas solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few. In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesnt overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE. * Written by a seasoned veteran of both cryptography and server-side programming * Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates * Includes a companion web site that contains the code for the examples in the book, open-source cryptographic toolkits, and further resources.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 9780127427515
Source: 102587:102606Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
339683
Java (Computer program language)
Index Terms--Genre/Form:
336502
Electronic books.
LC Class. No.: QA76.73.J38 / W445 2004eb
Dewey Class. No.: 005.8/2
Java cryptography extensions[electronic resource] :practical guide for programmers /
LDR
:04412cam 2200361Ia 4500
001
337986
003
OCoLC
005
20100729101520.0
006
m d
007
cr cn|||||||||
008
110620s2004 caua ob 001 0 eng d
020
$a
9780127427515
020
$a
0127427511
029
1
$a
NZ1
$b
12435071
035
$a
(OCoLC)162577586
035
$a
ocn162577586
037
$a
102587:102606
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$c
OPELS
049
$a
TEFA
050
1 4
$a
QA76.73.J38
$b
W445 2004eb
082
0 4
$a
005.8/2
$2
22
100
1
$a
Weiss, Jason.
$3
404915
245
1 0
$a
Java cryptography extensions
$h
[electronic resource] :
$b
practical guide for programmers /
$c
Jason Weiss.
260
$a
San Francisco, CA :
$b
Elsevier/Morgan Kaufmann,
$c
c2004.
300
$a
xv, 158 p. :
$b
ill. ;
$c
24 cm.
504
$a
Includes bibliographical references (p. 153-154) and index.
505
0
$a
Chapter 1: Understanding Javas Cryptographic Architecture Chapter 2: Working with Symmetric Ciphers Chapter 3: Working with Asymmetric Ciphers and Key Agreement Protocols Chapter 4: Message Digests, Message Authentication Codes, and Digital Signatures Chapter 5: Managing Keys and Certificates Bibliography.
520
$a
For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and its imperative that developers know what kinds of solutions exist. One of Javas solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few. In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesnt overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE. * Written by a seasoned veteran of both cryptography and server-side programming * Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates * Includes a companion web site that contains the code for the examples in the book, open-source cryptographic toolkits, and further resources.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on Aug. 2, 2007).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Java (Computer program language)
$3
339683
650
0
$a
Cryptography.
$3
381147
655
7
$a
Electronic books.
$2
local
$3
336502
710
2
$a
ScienceDirect (Online service)
$3
365609
776
1
$c
Original
$z
0127427511
$z
9780127427515
$w
(DLC) 2003070900
$w
(OCoLC)54007135
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9780127427515
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9780127427515
$z
An electronic book accessible through the World Wide Web; click for information
856
4 1
$3
Table of contents
$u
http://www.loc.gov/catdir/toc/els051/2003070900.html
856
4 2
$3
Publisher description
$u
http://www.loc.gov/catdir/description/els041/2003070900.html
994
$a
C0
$b
TEF
筆 0 讀者評論
多媒體
多媒體檔案
http://www.sciencedirect.com/science/book/9780127427515
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9780127427515
http://www.loc.gov/catdir/toc/els051/2003070900.html
http://www.loc.gov/catdir/description/els041/2003070900.html
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入