CLCTP3
LanguageENG
PublishYear2007
publishCompany
Wiley
EISBN
9780471757016
PISBN
9780764596339
edition
1
- Product Details
- Contents
What the Book Covers: The book will show the reader how to understand and use JCE, JCA, and the JSSE for encryption and authentication. It will walk the reader through how padding mechanisms work in ciphers, as well as spot and fix typical errors. It will provide an understanding of how authentication mechanisms can be implemented in Java and why they are used. It will show how cryptographic objects are described using ASN.1. Real World Web Solutions: Using the Bouncy Castle APIs for applying to common problems, the reader will understand how certificates are constructed, how to use the to generate certificates, validate certificate chains, create private credential objects which can be sensibly imported into other vendor products, as well understand how protocols like Cryptographic Message Syntax (CMS, or PKCS 7), S/MIME and SSL work. Website: extensive code examples, and working Java examples, will allow programmers to develop secure apps with cryptography and facilitate the try-it-out feature
Collected by
- University of Cambridge
- Yale University
- Harvard University