Java Cryptography
Knudsen, Jonathan
From Better World Books, Mishawaka, IN, U.S.A.
Seller rating 5 out of 5 stars
AbeBooks Seller since August 3, 2006
Used - Soft cover
Quantity: 1 available
Add to basketFrom Better World Books, Mishawaka, IN, U.S.A.
Seller rating 5 out of 5 stars
AbeBooks Seller since August 3, 2006
Quantity: 1 available
Add to basketAbout this Item
Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # 3743253-6
Bibliographic Details
Title: Java Cryptography
Publisher: O'Reilly Media, Incorporated
Publication Date: 1998
Binding: Soft cover
Condition: Very Good
Edition: 1st Edition.
About this title
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with.This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java Cryptography Architecture (JCA). Another set of classes, the Java Cryptography Extension (JCE), provides additional cryptographic functionality. This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards.The book is designed for moderately experienced Java programmers who want to learn how to build cryptography into their applications. No prior knowledge of cryptography is assumed. The book is peppered with useful examples, ranging from simple demonstrations in the first chapter to full-blown applications in later chapters.Topics include:
The Java language includes lots of classes that are designed to facilitate cryptography, and this book explores them in depth. Key management classes, random-number generators, signed applets, and other parts of the Java security mechanism get attention in these pages. But most interesting are the author's examples. He has written a complete implementation of the ElGamal cipher as a provider in the framework of the Java Security API. If you want to understand how the Provider Architecture works, this is what you need to examine. Don't look here for an explanation of the mathematics, however.
In addition to his discussions and examples for individual pieces of the cryptography infrastructure and his implementation of the ElGamal system, Knudsen includes two nifty crypto-enabled programs: a chat system and an e-mail system.
"About this title" may belong to another edition of this title.
Store Description
Better World Books (BWB) values your satisfaction and offers you returns within thirty (30) days after the estimated delivery date on most items. All returned items must be in the original condition; used items should include the SKU sticker located on the spine or back of the product.
If you have an incomplete, incorrect, or damaged shipment, please contact our Customer Care team via Abebooks contact seller options before proceeding with the return.Please keep in mind that because we deal mostl...
More InformationPlease allow 1-2 business days for order fulfillment.
Payment Methods
accepted by seller