LEADER 00000cam a2200673Ia 4500 001 ocn162577586 003 OCoLC 005 20160527041053.1 006 m o d 007 cr cn||||||||| 008 070806s2004 caua ob 001 0 eng d 019 180771782|a469636232|a476109849|a507273288|a607225291 |a636862635|a636862641|a647695846|a933930950 020 9780127427515 020 0127427511 020 9780080535241|q(electronic book) 020 0080535240|q(electronic book) 035 (OCoLC)162577586|z(OCoLC)180771782|z(OCoLC)469636232 |z(OCoLC)476109849|z(OCoLC)507273288|z(OCoLC)607225291 |z(OCoLC)636862635|z(OCoLC)636862641|z(OCoLC)647695846 |z(OCoLC)933930950 037 102587:102606|bElsevier Science & Technology|nhttp:// www.sciencedirect.com 040 OPELS|beng|epn|cOPELS|dOCLCQ|dN$T|dYDXCP|dOCLCE|dZCU|dE7B |dOCLCQ|dOCLCF|dMERUC|dEBLCP|dUKDOC|dDEBSZ|dOCLCQ|dUMI |dOCLCQ 042 dlr 049 RIDW 050 4 QA76.73.J38|bW445 2004eb 072 7 COM|x083000|2bisacsh 082 04 005.8/2|222 090 QA76.73.J38|bW445 2004eb 100 1 Weiss, Jason|q(Jason R.)|0https://id.loc.gov/authorities/ names/n2001009367 245 10 Java cryptography extensions :|bpractical guide for programmers /|cJason Weiss. 264 1 San Francisco, CA :|bElsevier/Morgan Kaufmann,|c[2004] 264 4 |c©2004 300 1 online resource (xv, 158 pages) :|billustrations. 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 340 |gpolychrome|2rdacc 347 text file|2rdaft 490 1 The Practical Guides Ser. 504 Includes bibliographical references (pages 153-154) and index. 505 0 Chapter 1: Understanding Javas Cryptographic Architecture Chapter 2: Working with Symmetric Ciphers Chapter 3: Working with Asymmetric Ciphers and Key Agreement Protocols Chapter 4: Message Digests, Message Authentication Codes, and Digital Signatures Chapter 5: Managing Keys and Certificates Bibliography. 506 |3Use copy|fRestrictions unspecified|2star|5MiAaHDL 520 For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and its imperative that developers know what kinds of solutions exist. One of Javas solutions to help bridge the gap between academic research and real- world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few. In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesnt overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE. * Written by a seasoned veteran of both cryptography and server-side programming * Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates * Includes a companion web site that contains the code for the examples in the book, open-source cryptographic toolkits, and further resources. 533 Electronic reproduction.|b[S.l.] :|cHathiTrust Digital Library,|d2010.|5MiAaHDL 538 Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.|uhttp://purl.oclc.org/DLF/benchrepro0212 |5MiAaHDL 583 1 digitized|c2010|hHathiTrust Digital Library|lcommitted to preserve|2pda|5MiAaHDL 588 0 Print version record. 590 eBooks on EBSCOhost|bEBSCO eBook Subscription Academic Collection - North America 650 0 Java (Computer program language)|0https://id.loc.gov/ authorities/subjects/sh95008574 650 0 Cryptography.|0https://id.loc.gov/authorities/subjects/ sh85034453 650 7 Java (Computer program language)|2fast|0https:// id.worldcat.org/fast/982065 650 7 Cryptography.|2fast|0https://id.worldcat.org/fast/884552 655 4 Electronic books. 776 08 |iPrint version:|aWeiss, Jason.|tJava cryptography extensions.|dSan Francisco, CA : Elsevier/Morgan Kaufmann, ©2004|z0127427511|z9780127427515|w(DLC) 2003070900 |w(OCoLC)54007135 830 0 Practical Guides Ser. 856 40 |uhttps://rider.idm.oclc.org/login?url=http:// search.ebscohost.com/login.aspx?direct=true&scope=site& db=nlebk&AN=210141|zOnline eBook. Access restricted to current Rider University students, faculty, and staff. 856 42 |3Instructions for reading/downloading this eBook|uhttp:// guides.rider.edu/ebooks/ebsco 901 MARCIVE 20231220 948 |d20160615|cEBSCO|tebscoebooksacademic|lridw 994 92|bRID