Java Ebooks, Java Tutors

Java Ebooks, Java Tutors

Friday, February 10, 2006

java Cryptography

java Cryptography teaches you how to write secure programs using Java's cryptographic tools. It includes thorough discussions of the java.security package and the Java Cryptography Extensions (JCE), showing you how to use security providers and even implement your own provider. It discusses authentication, key management, public and private key encryption, and includes a secure talk application that encrypts all data sent over the network. If you work with sensitive data, you'll find this book indispensable.
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with.
This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java Cryptography Architecture (JCA). Another set of classes, the Java Cryptography Extension (JCE), provides additional cryptographic functionality. This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards.
The book is designed for moderately experienced Java programmers who want to learn how to build cryptography into their applications. No prior knowledge of cryptography is assumed. The book is peppered with useful examples, ranging from simple demonstrations in the first chapter to full-blown applications in later chapters.

Topics include:
The Java Cryptography Architecture (JCA) The Java Cryptography Extension (JCE) Cryptographic providers The Sun key management tools Message digests, digital signatures, and certificates (X509v3) Block and stream ciphers Implementations of the ElGamal signature and cipher algorithms A network talk application that encrypts all data sent over the network An email application that encrypts its messages Covers JDK 1.2 and JCE 1.2.

Filesize: 1.47 MB

http://rapidshare.de/files/11569172/OReilly_-_Java_Cryptography.by.Bloodrayne.pdf

No comments:

Google

Translate This PAGE TO LANGUAGE U UNDERSTAND

    

RECEPIES,SOUPS,PIZZA,CHAAT AND DISHES

RECEPIES,SOUPS,PIZZA,CHAAT AND DISHES

Digital Information ,Motivating Information, Information Is Wealth PERL PROGRAMMERS AND DEVELOPERS RECEPIES,SOUPS,PIZZA,CHAAT AND DISHES FUN JOKES HANGAAMA


Disclaimer: This site was created as a service to those learning programming that might not have the resources available to purchase books. Let's face it...books are expensive. It is not the purpose of this site to infringe on any author's rights. If you are an author, and a book of yours is listed here, and it is not your intention to make it freely available, please contact me mahaveerchand-dot-jain at gmail.com and the link will be removed. I do not host any of these books nor do I have any control over those hosting them. I am merely listing links that I have found from numerous Google searches.Webmaster of this site is not responsible to any damage of property to the owner of the ebook

© 2006-2007 http://downloadsandreviews.blogspot.com/