Skip to content
You are not logged in |Login  

LEADER 00000cam a2200673Ia 4500 
001    ocn162577586 
003    OCoLC 
005    20160527041053.1 
006    m     o  d         
007    cr cn||||||||| 
008    070806s2004    caua    ob    001 0 eng d 
019    180771782|a469636232|a476109849|a507273288|a607225291
       |a636862635|a636862641|a647695846|a933930950 
020    9780127427515 
020    0127427511 
020    9780080535241|q(electronic book) 
020    0080535240|q(electronic book) 
035    (OCoLC)162577586|z(OCoLC)180771782|z(OCoLC)469636232
       |z(OCoLC)476109849|z(OCoLC)507273288|z(OCoLC)607225291
       |z(OCoLC)636862635|z(OCoLC)636862641|z(OCoLC)647695846
       |z(OCoLC)933930950 
037    102587:102606|bElsevier Science & Technology|nhttp://
       www.sciencedirect.com 
040    OPELS|beng|epn|cOPELS|dOCLCQ|dN$T|dYDXCP|dOCLCE|dZCU|dE7B
       |dOCLCQ|dOCLCF|dMERUC|dEBLCP|dUKDOC|dDEBSZ|dOCLCQ|dUMI
       |dOCLCQ 
042    dlr 
049    RIDW 
050  4 QA76.73.J38|bW445 2004eb 
072  7 COM|x083000|2bisacsh 
082 04 005.8/2|222 
090    QA76.73.J38|bW445 2004eb 
100 1  Weiss, Jason|q(Jason R.)|0https://id.loc.gov/authorities/
       names/n2001009367 
245 10 Java cryptography extensions :|bpractical guide for 
       programmers /|cJason Weiss. 
264  1 San Francisco, CA :|bElsevier/Morgan Kaufmann,|c[2004] 
264  4 |c©2004 
300    1 online resource (xv, 158 pages) :|billustrations. 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
340    |gpolychrome|2rdacc 
347    text file|2rdaft 
490 1  The Practical Guides Ser. 
504    Includes bibliographical references (pages 153-154) and 
       index. 
505 0  Chapter 1: Understanding Javas Cryptographic Architecture 
       Chapter 2: Working with Symmetric Ciphers Chapter 3: 
       Working with Asymmetric Ciphers and Key Agreement 
       Protocols Chapter 4: Message Digests, Message 
       Authentication Codes, and Digital Signatures Chapter 5: 
       Managing Keys and Certificates Bibliography. 
506    |3Use copy|fRestrictions unspecified|2star|5MiAaHDL 
520    For a long time, there has been a need for a practical, 
       down-to-earth developers book for the Java Cryptography 
       Extension. I am very happy to see there is now a book that
       can answer many of the technical questions that developers,
       managers, and researchers have about such a critical 
       topic. I am sure that this book will contribute greatly to
       the success of securing Java applications and deployments 
       for e-business. --Anthony Nadalin, Java Security Lead 
       Architect, IBM For many Java developers and software 
       engineers, cryptography is an "on-demand" programming 
       exercise, where cryptographic concepts are shelved until 
       the next project requires renewed focus. But 
       considerations for cryptography must be made early on in 
       the design process and its imperative that developers know
       what kinds of solutions exist. One of Javas solutions to 
       help bridge the gap between academic research and real-
       world problem solving comes in the form of a well-defined 
       architecture for implementing cryptographic solutions. 
       However, to use the architecture and its extensions, it is
       important to recognize the pros and cons of different 
       cryptographic algorithms and to know how to implement 
       various devices like key agreements, digital signatures, 
       and message digests, to name a few. In Java Cryptography 
       Extensions (JCE), cryptography is discussed at the level 
       that developers need to know to work with the JCE and with
       their own applications but that doesnt overwhelm by 
       packing in details unimportant to the busy professional. 
       The JCE is explored using numerous code examples and 
       instructional detail, with clearly presented sections on 
       each aspect of the Java library. An online open-source 
       cryptography toolkit and the code for all of the examples 
       further reinforces the concepts covered within the book. 
       No other resource presents so concisely or effectively the
       exact material needed to begin utilizing the JCE. * 
       Written by a seasoned veteran of both cryptography and 
       server-side programming * Covers the architecture of the 
       JCE, symmetric ciphers, asymmetric ciphers, message 
       digests, message authentication codes, digital signatures,
       and managing keys and certificates * Includes a companion 
       web site that contains the code for the examples in the 
       book, open-source cryptographic toolkits, and further 
       resources. 
533    Electronic reproduction.|b[S.l.] :|cHathiTrust Digital 
       Library,|d2010.|5MiAaHDL 
538    Master and use copy. Digital master created according to 
       Benchmark for Faithful Digital Reproductions of Monographs
       and Serials, Version 1. Digital Library Federation, 
       December 2002.|uhttp://purl.oclc.org/DLF/benchrepro0212
       |5MiAaHDL 
583 1  digitized|c2010|hHathiTrust Digital Library|lcommitted to 
       preserve|2pda|5MiAaHDL 
588 0  Print version record. 
590    eBooks on EBSCOhost|bEBSCO eBook Subscription Academic 
       Collection - North America 
650  0 Java (Computer program language)|0https://id.loc.gov/
       authorities/subjects/sh95008574 
650  0 Cryptography.|0https://id.loc.gov/authorities/subjects/
       sh85034453 
650  7 Java (Computer program language)|2fast|0https://
       id.worldcat.org/fast/982065 
650  7 Cryptography.|2fast|0https://id.worldcat.org/fast/884552 
655  4 Electronic books. 
776 08 |iPrint version:|aWeiss, Jason.|tJava cryptography 
       extensions.|dSan Francisco, CA : Elsevier/Morgan Kaufmann,
       ©2004|z0127427511|z9780127427515|w(DLC)  2003070900
       |w(OCoLC)54007135 
830  0 Practical Guides Ser. 
856 40 |uhttps://rider.idm.oclc.org/login?url=http://
       search.ebscohost.com/login.aspx?direct=true&scope=site&
       db=nlebk&AN=210141|zOnline eBook. Access restricted to 
       current Rider University students, faculty, and staff. 
856 42 |3Instructions for reading/downloading this eBook|uhttp://
       guides.rider.edu/ebooks/ebsco 
901    MARCIVE 20231220 
948    |d20160615|cEBSCO|tebscoebooksacademic|lridw 
994    92|bRID