Java Cryptography by Jonathan Knudsen: New

AlibrisBooks
(483724)
Registrato come venditore professionale
US $49,62
CircaEUR 42,57
Condizione:
Nuovo
Goditi i vantaggi. Restituzioni accettate.
Spedizione:
Gratis Standard Shipping.
Oggetto che si trova a: Sparks, Nevada, Stati Uniti
Consegna:
Consegna prevista tra il gio 23 ott e il mer 29 ott a 94104
I tempi di consegna previsti utilizzando il metodo proprietario di eBay, che è basato sulla vicinanza dell'acquirente rispetto al luogo in cui si trova l'oggetto, sul servizio di spedizione selezionato, sulla cronologia di spedizione del venditore e su altri fattori. I tempi di consegna possono variare, specialmente durante le festività.
Restituzioni:
Restituzioni entro 30 giorni. Le spese di spedizione del reso sono a carico dell'acquirente..
Pagamenti:
    Diners Club

Fai shopping in tutta sicurezza

Garanzia cliente eBay
Se non ricevi l'oggetto che hai ordinato, riceverai il rimborso. Scopri di piùGaranzia cliente eBay - viene aperta una nuova finestra o scheda
Il venditore si assume la piena responsabilità della messa in vendita dell'oggetto.
Numero oggetto eBay:284319435087
Ultimo aggiornamento: 08 ott 2025 20:21:05 CESTVedi tutte le revisioniVedi tutte le revisioni

Specifiche dell'oggetto

Condizione
Nuovo: Libro nuovo, intatto e non letto, in perfette condizioni, senza pagine mancanti o ...
Book Title
Java Cryptography
Publication Date
1998-06-09
Pages
362
ISBN
9781565924024
Categoria

Informazioni su questo prodotto

Product Identifiers

Publisher
O'reilly Media, Incorporated
ISBN-10
1565924029
ISBN-13
9781565924024
eBay Product ID (ePID)
234103

Product Key Features

Number of Pages
362 Pages
Language
English
Publication Name
Java Cryptography
Subject
Programming / General, Communication Studies, Programming Languages / Java, Programming / Object Oriented
Publication Year
1998
Type
Textbook
Author
Jonathan Knudsen
Subject Area
Computers, Language Arts & Disciplines
Format
Trade Paperback

Dimensions

Item Height
0.9 in
Item Weight
22.3 Oz
Item Length
9.2 in
Item Width
7 in

Additional Product Features

Intended Audience
Scholarly & Professional
LCCN
00-500283
Dewey Edition
21
Illustrated
Yes
Dewey Decimal
005.82
Table Of Content
Preface; Who Are You?; About This Book; What's Not in This Book; About the Examples; Font Conventions; Request for Comments; Acknowledgments;Chapter 1: Introduction; 1.1 Secure Systems; 1.2 Cryptography; 1.3 Platform Security; 1.4 Astute Inequalities; 1.5 Hello, zoT1wy1njA0=!;Chapter 2: Concepts; 2.1 Confidentiality; 2.2 Integrity; 2.3 Authentication; 2.4 Random Numbers; 2.5 Algorithms;Chapter 3: Architecture; 3.1 Alphabet Soup; 3.2 Concept Classes; 3.3 API and SPI; 3.4 Factory Methods; 3.5 Standard Names; 3.6 The Provider Architecture; 3.7 Key Management; 3.8 Summary;Chapter 4: Random Numbers; 4.1 SecureRandom; 4.2 Self-Seeding; 4.3 Keyboard Timing; 4.4 SeederDialog;Chapter 5: Key Management; 5.1 Keys; 5.2 Key Generators; 5.3 Key Translators; 5.4 Key Agreement; 5.5 The Identity Key Management Paradigm; 5.6 The KeyStore Key Management Paradigm;Chapter 6: Authentication; 6.1 Message Digests; 6.2 MACs; 6.3 Signatures; 6.4 Certificates;Chapter 7: Encryption; 7.1 Streams and Blocks; 7.2 Block Ciphers; 7.3 Algorithms; 7.4 javax.crypto.Cipher; 7.5 Cipher's Close Relatives; 7.6 Passphrase Encryption; 7.7 Inside Cipher; 7.8 Hybrid Systems;Chapter 8: Signed Applets; 8.1 Renegade; 8.2 HotJava; 8.3 Navigator; 8.4 Internet Explorer; 8.5 Summary;Chapter 9: Writing a Provider; 9.1 Getting Started; 9.2 Adding the ElGamal Classes; 9.3 ElGamal; 9.4 Generating Keys; 9.5 Signature; 9.6 Cipher;Chapter 10: SafeTalk; 10.1 Using SafeTalk; 10.2 Under the Hood;Chapter 11: CipherMail; 11.1 Using CipherMail; 11.2 Under the Hood;Chapter 12: Outside the Box; 12.1 Application Design; 12.2 Decompilers and Bytecode Obfuscation; 12.3 Endpoint Security; 12.4 File Security; 12.5 Network Security; 12.6 Summary;BigInteger;Base64;JAR; Creating; Extracting; The Manifest; Signing;Javakey; Creating; Inspecting; Gimme the Keys...; Certificates; To and Fro; Sign of the Times; The Care and Feeding of Keys;Quick Reference; Package java.security; Package java.security.cert; Package java.security.interfaces; Package java.security.spec; Package javax.crypto; Package javax.crypto.interfaces; Package javax.crypto.spec;Colophon;
Synopsis
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with. This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java Cryptography Architecture (JCA). Another set of classes, the Java Cryptography Extension (JCE), provides additional cryptographic functionality. This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards. The book is designed for moderately experienced Java programmers who want to learn how to build cryptography into their applications. No prior knowledge of cryptography is assumed. The book is peppered with useful examples, ranging from simple demonstrations in the first chapter to full-blown applications in later chapters. Topics include: The Java Cryptography Architecture (JCA) The Java Cryptography Extension (JCE) Cryptographic providers The Sun key management tools Message digests, digital signatures, and certificates (X509v3) Block and stream ciphers Implementations of the ElGamal signature and cipher algorithms A network talk application that encrypts all data sent over the network An email application that encrypts its messages Covers JDK 1.2 and JCE 1.2., Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with.This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java Cryptography Architecture (JCA). Another set of classes, the Java Cryptography Extension (JCE), provides additional cryptographic functionality. This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards.The book is designed for moderately experienced Java programmers who want to learn how to build cryptography into their applications. No prior knowledge of cryptography is assumed. The book is peppered with useful examples, ranging from simple demonstrations in the first chapter to full-blown applications in later chapters.Topics include: The Java Cryptography Architecture (JCA) The Java Cryptography Extension (JCE) Cryptographic providers The Sun key management tools Message digests, digital signatures, and certificates (X509v3) Block and stream ciphers Implementations of the ElGamal signature and cipher algorithms A network talk application that encrypts all data sent over the network An email application that encrypts its messages Covers JDK 1.2 and JCE 1.2., Java Cryptography teaches you how to write secure programs using Java's cryptographic tools. It thoroughly discusses the java.security package and the Java Cryptography Extensions (JCE), showing you how to use security providers and even how to implement your own provider. It covers authentication, key management, and public and private key encryption and includes a secure talk application that encrypts all data sent over the network. If you work with sensitive data, you'll find this book indispensable., "Java Cryptology" teaches you how to write secure programs using Java's cryptographic tools. It thoroughly discusses the Java security package and the Java Cryptography Extensions (JCE), showing you how to use security providers and even how to implement your own provider. If you work with sensitive data, you'll find this book indispensable.
LC Classification Number
QA76.73.J38K59 1999

Descrizione dell'oggetto fatta dal venditore

Informazioni sul venditore professionale

Certifico che tutte le mie attività di vendita saranno conformi alle leggi e ai regolamenti dell'Unione europea.
Informazioni su questo venditore

AlibrisBooks

98,9% di Feedback positivi2,0 milioni oggetti venduti

Su eBay da mag 2008
In genere risponde entro 24 ore
Registrato come venditore professionale
Alibris is the premier online marketplace for independent sellers of new & used books, as well as rare & collectible titles. We connect people who love books to thousands of independent sellers around ...
Mostra altro

Valutazione dettagliata del venditore

Media degli ultimi 12 mesi
Descrizione
4.9
Spese spedizione
5.0
Tempi di spedizione
5.0
Comunicazione
5.0

Feedback sul venditore (537.688)

Tutti i punteggiselected
Positivo
Neutro
Negativo
  • e***n (392)- Feedback lasciato dall'acquirente.
    Ultimi 6 mesi
    Acquisto verificato
    Great transaction, exactly as described, packed well, and promptly shipped on August 6th. Unfortunately the U.S. Postal Service took 23 calendar days to deliver the book. It was shipped from Pennsylvania, to Atlanta, past Alabama to Texas, enjoyed several days in Texas, then to Minneapolis, Jacksonville, Florida, back to Atlanta, finally to Birmingham, and Huntsville. The seller was very responsive and I decided it was interesting to see if/how the book would arrive. Thanks, Joe
  • 0***g (380)- Feedback lasciato dall'acquirente.
    Mese scorso
    Acquisto verificato
    Excellent purchase. Was able to get all three items from the one seller. Seller was able to bundle all three items together into one package. Items as described and arrived in perfect condition. Good communication around shipping and tracking as items delayed and not able to be delivered by original estimate. Thanks to shipping updates I was able to track the items arriving before the extended delivery time. Thank you for making these items available on EBay.
  • _***b (63)- Feedback lasciato dall'acquirente.
    Ultimi 6 mesi
    Acquisto verificato
    I gave 5 stars on shipping because i sent 2 separate emails + they responded with helpful info, even though it arrived late. This was a great value with free shipping + the condition is very good, better than advertised 🙂! The overall quality and appearance is excellent! I highly recommend this seller and give them 👍👍👍👍