In weniger als einer Minute können Sie mit dem Lesen von Java Cryptography Extensions: Practical Guide for Program... auf Ihrem Kindle beginnen. Sie haben noch keinen Kindle? Hier kaufen Oder fangen Sie mit einer unserer gratis Kindle Lese-Apps sofort an zu lesen.

An Ihren Kindle oder ein anderes Gerät senden

 
 
 

Kostenlos testen

Jetzt kostenlos reinlesen

An Ihren Kindle oder ein anderes Gerät senden

Jeder kann Kindle Bücher lesen  selbst ohne ein Kindle-Gerät  mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.
Java Cryptography Extensions: Practical Guide for Programmers (The Practical Guides)
 
 

Java Cryptography Extensions: Practical Guide for Programmers (The Practical Guides) [Kindle Edition]

Jason R. Weiss

Kindle-Preis: EUR 17,27 Inkl. MwSt. und kostenloser drahtloser Lieferung über Amazon Whispernet

Weitere Ausgaben

Amazon-Preis Neu ab Gebraucht ab
Kindle Edition EUR 17,27  
Taschenbuch EUR 23,00  

Kunden, die diesen Artikel gekauft haben, kauften auch


Produktbeschreibungen

Pressestimmen

"For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business." --Anthony Nadalin, Java Security Lead Architect, IBM "I think it's worth having a copy of this book in the company library." - Dr Dobb's Journal, November 2004 "No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE." Stefan Meyer (Berlin) Zentralblatt MATH 1060, November 2005

Kurzbeschreibung

For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM

For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and it’s imperative that developers know what kinds of solutions exist.

One of Java’s solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few.

In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesn’t overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE.

* Written by a seasoned veteran of both cryptography and server-side programming
* Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates
* Includes a companion web site that contains the code for the examples in the book, open-source cryptographic toolkits, and further resources

Produktinformation

  • Format: Kindle Edition
  • Dateigröße: 1619 KB
  • Seitenzahl der Print-Ausgabe: 176 Seiten
  • Verlag: Morgan Kaufmann; Auflage: 1 (18. Mai 2004)
  • Verkauf durch: Amazon Media EU S.à r.l.
  • Sprache: Englisch
  • ASIN: B001MV7VIU
  • Text-to-Speech (Vorlesemodus): Aktiviert
  • X-Ray:
  • Amazon Bestseller-Rang: #449.831 Bezahlt in Kindle-Shop (Siehe Top 100 Bezahlt in Kindle-Shop)

  •  Ist der Verkauf dieses Produkts für Sie nicht akzeptabel?

Mehr über den Autor

Entdecken Sie Bücher, lesen Sie über Autoren und mehr

Kundenrezensionen

Es gibt noch keine Kundenrezensionen auf Amazon.de
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Sterne
Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)
Amazon.com: 3.5 von 5 Sternen  4 Rezensionen
2 von 2 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Excellent practical guide! 1. Oktober 2009
Von Vladimir Tsitrin - Veröffentlicht auf Amazon.com
Format:Taschenbuch
This is an excellent book for those who understand the theory behind cryptography, digital signatures, certificates, etc, and just want to start implementing all these things using Java fast. This is not an exhaustive cookbook, though, covering all possible situations but rather a quick start guide that allows a person with no previous experience in JCA and JCE to implement encryption/decryption, hashing or digital signature generation/verification in minutes. One of the very rare books where not every page but every line is to the point and one doesn't have to filter out annoying discussions looking for useful information.
3 von 4 Kunden fanden die folgende Rezension hilfreich
2.0 von 5 Sternen Limited help and weak examples 7. April 2006
Von Hemant Kesarkar - Veröffentlicht auf Amazon.com
Format:Taschenbuch
The book has good introduction material the examples described in the book are bit old and some of the classes are deprecated. The book also needs an update to include newer features of JCE and JSSE. I hurried up to buy this book and then realized it is bit outdated. Now I have Core security patterns by chris steel which covers well on cryptography api and examples using j2se 5.0 and j2ee 1.4 as well.
3 von 5 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Truly a practical guide 6. Juni 2005
Von M. King - Veröffentlicht auf Amazon.com
Format:Taschenbuch
This book delivers on what it promises. A practical guide to implementations using the JCA and JCE. If you're a Java developer starting on projects that deal with certificates, keystores, encryption, digital signatures, tokens, digests, or hardware cryptographic devices (HSMs), then you need to read this book before you begin.

Jason covers the topics he sets out to cover. If your eyes glazed over at the JCA documentation describing EngineSPIs or at mathematical treatises on crypto algorithms, then this book is for you. He gets right to the meat of the matter, and the code is simple enough to follow without having an IDE running. There are only a few typographical flaws, and nothing that distracted from the concepts being explained.

The book walks you through the overall provider architecture, gives examples of provider selection and some key workaround information for some historical problems as the JCA and JCE were being developed, extended, and improved by Sun.

Straight-up crypto is covered with symmetric and asymmetric keys, the coverage of block and stream ciphers, and the importance of specifying chaining (EBC/CBC/etc.) and padding (PKCS1/PKCS5/etc.). Digests, HMACs, Password-based encryption (PBE) and digital certificates are covered, along with key exchange (DH), and key management in keystores. The extra depth the author gives on key management was quite welcome, and often ignored. Examples using the Java keytool utility will also be appreciated by the target audience.

In short, this book is going to be on my required reading list for the Java application developer generalist starting on projects that involve crypto or, in particular, certificates. In my case, I use hardware-based keystores, and this book makes it very easy for me to build a common understanding in explaining what we want our team to accomplish.

This book should take about a week to digest.

What you won't find in this book are recipes or procedures. It's a practical guide, and lives up to the title. This book won't be a help to people writing JCPs either -- it's clearly targeted at the application developer needing to do things like load a certificate, implement a 3DES encryption/decryption, generate keys, or make sure you're using the required JCP implementation for your project. It also won't explain the nuances of ECB and CBC, or Blowfish and AES. But it will give you a practical guide on their fundamental differences as to the impact they have on your development. All example code is in Java. It doesn't cover elliptical algorithms, but, after reading this book, you shouldn't have a problem with writing code that relies on a specific provider's features.

As for the price, quite reasonable, and very useful to pass along or lend to the newcomers to your team.
5 von 8 Kunden fanden die folgende Rezension hilfreich
2.0 von 5 Sternen Practical not so practical 4. Oktober 2005
Von zamies - Veröffentlicht auf Amazon.com
Format:Taschenbuch
What's wrong with this book? There is no thorough explanation of the concepts of cryptography, he just starts off taking shotcuts and with code examples that are absolutely not mature.

I have a theoretical background in cryptography, but often had to read the text many times over before I could understand what the author was trying to say.

This is the starting point for a practical guide on java cryptography, an introduction, but by no means enough.

I would have considered giving it 3 stars, weren't it not that het appendix A on Base64coding, another topic that the author doesn't treat, is completely missing !
Waren diese Rezensionen hilfreich?   Wir wollen von Ihnen hören.

Kunden diskutieren

Das Forum zu diesem Produkt
Diskussion Antworten Jüngster Beitrag
Noch keine Diskussionen

Fragen stellen, Meinungen austauschen, Einblicke gewinnen
Neue Diskussion starten
Thema:
Erster Beitrag:
Eingabe des Log-ins
 

Kundendiskussionen durchsuchen
Alle Amazon-Diskussionen durchsuchen
   


Ähnliche Artikel finden