0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • -
Status
Brand

Showing 1 - 1 of 1 matches in All Departments

Java Cryptography Extensions - Practical Guide for Programmers (Paperback): Jason R. Weiss Java Cryptography Extensions - Practical Guide for Programmers (Paperback)
Jason R. Weiss
R1,002 Discovery Miles 10 020 Ships in 18 - 22 working days

For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM
For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and it s imperative that developers know what kinds of solutions exist.
One of Java s solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few.
In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesn t overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE.
* Written by a seasoned veteran of both cryptography and server-side programming
* Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates
* Includes a companion web site that contains the code for the examples in the book, open-source cryptographic toolkits, and further resources"

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
SAS: Rogue Heroes - The Authorized…
Ben MacIntyre Paperback  (1)
R294 R270 Discovery Miles 2 700
LPI Linux Essentials Study Guide - Exam…
C Bresnahan Paperback R1,078 R893 Discovery Miles 8 930
Paul Kruger - Toesprake En…
Johan Bergh Hardcover  (3)
R396 Discovery Miles 3 960
Positive Leadership in Practice - A…
Cornelia Lucey, Jolanta Burke Hardcover R4,491 Discovery Miles 44 910
Space and Geometry in the Light of…
Ernst Mach Paperback R420 Discovery Miles 4 200
Gord's Gold
Gordon Lightfoot CD R230 Discovery Miles 2 300
Computational Analysis of Terrorist…
V.S. Subrahmanian, Aaron Mannes, … Hardcover R3,121 Discovery Miles 31 210
Places in Motion - The Fluid Identities…
Jacob N. Kinnard Hardcover R3,839 Discovery Miles 38 390
Wanted Dead & Alive - The Case For South…
Gregory Mthembu-Salter Paperback R250 R231 Discovery Miles 2 310
Vectors in Two or Three Dimensions
Ann Hirst Paperback R1,019 Discovery Miles 10 190

 

Partners