|刊登類別:
有類似物品要出售?

Java Cryptography by Jonathan Knudsen: New

US $49.62
大約HK$ 388.23
狀況:
全新
無後顧之憂! 賣家接受退貨。
運送:
免費 Standard Shipping.
所在地:Sparks, Nevada, 美國
送達日期:
估計於 8月21日 (星期四)8月27日 (星期三)之間送達 運送地點 94104
估計運送時間是透過我們的獨家工具,根據買家與物品所在地的距離、所選的運送服務、賣家的運送紀錄及其他因素,計算大概的時間。送達時間會因時而異,尤其是節日。
退貨:
30 日退貨. 由買家支付退貨運費,如果你使用 eBay 郵寄標籤,相關費用將從你的退款金額中扣除.
保障:
請參閱物品說明或聯絡賣家以取得詳細資料。閱覽全部詳情查看保障詳情
(不符合「eBay 買家保障方案」資格)
賣家必須承擔此刊登物品的所有責任。
eBay 物品編號:284319435087
上次更新時間: 2025-06-21 08:50:46查看所有版本查看所有版本

物品細節

物品狀況
全新: 全新,未閱讀過和使用過的書籍,狀況完好,不存在缺頁或內頁受損。 查看所有物品狀況定義會在新視窗或分頁中開啟
Book Title
Java Cryptography
Publication Date
1998-06-09
Pages
362
ISBN
9781565924024

關於產品

Product Identifiers

Publisher
O'reilly Media, Incorporated
ISBN-10
1565924029
ISBN-13
9781565924024
eBay Product ID (ePID)
234103

Product Key Features

Number of Pages
364 Pages
Publication Name
Java Cryptography
Language
English
Publication Year
1998
Subject
Programming / General, Communication Studies, Programming Languages / Java, Programming / Object Oriented
Type
Textbook
Author
Jonathan Knudsen
Subject Area
Computers, Language Arts & Disciplines
Series
Java Ser.
Format
Trade Paperback

Dimensions

Item Height
0.7 in
Item Weight
20.8 Oz
Item Length
9.2 in
Item Width
7 in

Additional Product Features

Intended Audience
Scholarly & Professional
LCCN
00-500283
Dewey Edition
21
Illustrated
Yes
Dewey Decimal
005.82
Table Of Content
Preface; Who Are You?; About This Book; What's Not in This Book; About the Examples; Font Conventions; Request for Comments; Acknowledgments;Chapter 1: Introduction; 1.1 Secure Systems; 1.2 Cryptography; 1.3 Platform Security; 1.4 Astute Inequalities; 1.5 Hello, zoT1wy1njA0=!;Chapter 2: Concepts; 2.1 Confidentiality; 2.2 Integrity; 2.3 Authentication; 2.4 Random Numbers; 2.5 Algorithms;Chapter 3: Architecture; 3.1 Alphabet Soup; 3.2 Concept Classes; 3.3 API and SPI; 3.4 Factory Methods; 3.5 Standard Names; 3.6 The Provider Architecture; 3.7 Key Management; 3.8 Summary;Chapter 4: Random Numbers; 4.1 SecureRandom; 4.2 Self-Seeding; 4.3 Keyboard Timing; 4.4 SeederDialog;Chapter 5: Key Management; 5.1 Keys; 5.2 Key Generators; 5.3 Key Translators; 5.4 Key Agreement; 5.5 The Identity Key Management Paradigm; 5.6 The KeyStore Key Management Paradigm;Chapter 6: Authentication; 6.1 Message Digests; 6.2 MACs; 6.3 Signatures; 6.4 Certificates;Chapter 7: Encryption; 7.1 Streams and Blocks; 7.2 Block Ciphers; 7.3 Algorithms; 7.4 javax.crypto.Cipher; 7.5 Cipher's Close Relatives; 7.6 Passphrase Encryption; 7.7 Inside Cipher; 7.8 Hybrid Systems;Chapter 8: Signed Applets; 8.1 Renegade; 8.2 HotJava; 8.3 Navigator; 8.4 Internet Explorer; 8.5 Summary;Chapter 9: Writing a Provider; 9.1 Getting Started; 9.2 Adding the ElGamal Classes; 9.3 ElGamal; 9.4 Generating Keys; 9.5 Signature; 9.6 Cipher;Chapter 10: SafeTalk; 10.1 Using SafeTalk; 10.2 Under the Hood;Chapter 11: CipherMail; 11.1 Using CipherMail; 11.2 Under the Hood;Chapter 12: Outside the Box; 12.1 Application Design; 12.2 Decompilers and Bytecode Obfuscation; 12.3 Endpoint Security; 12.4 File Security; 12.5 Network Security; 12.6 Summary;BigInteger;Base64;JAR; Creating; Extracting; The Manifest; Signing;Javakey; Creating; Inspecting; Gimme the Keys...; Certificates; To and Fro; Sign of the Times; The Care and Feeding of Keys;Quick Reference; Package java.security; Package java.security.cert; Package java.security.interfaces; Package java.security.spec; Package javax.crypto; Package javax.crypto.interfaces; Package javax.crypto.spec;Colophon;
Synopsis
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with.This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java Cryptography Architecture (JCA). Another set of classes, the Java Cryptography Extension (JCE), provides additional cryptographic functionality. This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards.The book is designed for moderately experienced Java programmers who want to learn how to build cryptography into their applications. No prior knowledge of cryptography is assumed. The book is peppered with useful examples, ranging from simple demonstrations in the first chapter to full-blown applications in later chapters.Topics include: The Java Cryptography Architecture (JCA) The Java Cryptography Extension (JCE) Cryptographic providers The Sun key management tools Message digests, digital signatures, and certificates (X509v3) Block and stream ciphers Implementations of the ElGamal signature and cipher algorithms A network talk application that encrypts all data sent over the network An email application that encrypts its messages Covers JDK 1.2 and JCE 1.2., Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with. This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java Cryptography Architecture (JCA). Another set of classes, the Java Cryptography Extension (JCE), provides additional cryptographic functionality. This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards. The book is designed for moderately experienced Java programmers who want to learn how to build cryptography into their applications. No prior knowledge of cryptography is assumed. The book is peppered with useful examples, ranging from simple demonstrations in the first chapter to full-blown applications in later chapters. Topics include: The Java Cryptography Architecture (JCA) The Java Cryptography Extension (JCE) Cryptographic providers The Sun key management tools Message digests, digital signatures, and certificates (X509v3) Block and stream ciphers Implementations of the ElGamal signature and cipher algorithms A network talk application that encrypts all data sent over the network An email application that encrypts its messages Covers JDK 1.2 and JCE 1.2., Java Cryptography teaches you how to write secure programs using Java's cryptographic tools. It thoroughly discusses the java.security package and the Java Cryptography Extensions (JCE), showing you how to use security providers and even how to implement your own provider. It covers authentication, key management, and public and private key encryption and includes a secure talk application that encrypts all data sent over the network. If you work with sensitive data, you'll find this book indispensable., "Java Cryptology" teaches you how to write secure programs using Java's cryptographic tools. It thoroughly discusses the Java security package and the Java Cryptography Extensions (JCE), showing you how to use security providers and even how to implement your own provider. If you work with sensitive data, you'll find this book indispensable.
LC Classification Number
QA76.73.J38K59 1999

賣家提供的物品說明

賣家簡介

AlibrisBooks

98.6% 正面信用評價已賣出 195.08 萬 件物品

加入日期:5月 2008
通常在 24 小時內回覆
Alibris is the premier online marketplace for independent sellers of new & used books, as well as rare & collectible titles. We connect people who love books to thousands of independent sellers around ...
查看更多內容
瀏覽商店聯絡

詳盡賣家評級

過去 12 個月的平均評級
說明準確
4.9
運費合理
5.0
運送速度
5.0
溝通
5.0

賣家信用評價 (515,550)

全部評級
正面
中立
負面