Acheter d'occasion
EUR 44,04
+ EUR 2,99 (livraison en France métropolitaine)
D'occasion: Très bon | Détails
Vendu par tousbouquins
État: D'occasion: Très bon
Commentaire: Expédié par avion depuis les USA; prévoir une livraison entre 10 à 15 jours ouvrables. Satisfait ou remboursé
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir cette image

[(Java Cryptography)] [by: Jonathan Knudsen] (Anglais) Broché – 8 mai 1998

3,1 étoiles sur 5
5 étoiles
5
4 étoiles
5
3 étoiles
2
2 étoiles
1
1 étoile
6
3,1 étoiles sur 5 19 commentaires client

Voir les 3 formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Broché
"Veuillez réessayer"
EUR 43,20 EUR 44,04

nouveautés livres nouveautés livres

click to open popover

Offres spéciales et liens associés


Descriptions du produit

Java Cryptography Explaining how to write secure programs using Java's cryptographic tools, this text discusses authentication, key management, public and private key encryption. Full description

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.



Détails sur le produit

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 3.1 étoiles sur 5 19 commentaires
1.0 étoiles sur 5 Not terribly useful and somewhat misleading 29 décembre 2013
Par Amazon Customer - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
I was expecting essentially a Java version of Schneiers Applied Cryptography where proven crypto algorithms are reimplelemented in Java. This book seems to be more focused on teaching readers how to implement the author's toy crypto algorithms. Readers would be better off reading Cryptography Engineering and learning the Java BouncyCastle libraries.
1 internautes sur 1 ont trouvé ce commentaire utile 
1.0 étoiles sur 5 A recent Kindle release date, does not a relevant book make 10 mai 2013
Par Rob L - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
I bought the Kindle version of this book based on the reasonably recent release date. It turned out to be a decade older than that. Technical books do not age like wine, they age like cheese. Stinking, mouldy, worthless cheese.
1 internautes sur 4 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Best Java Cryptography Book Ever! 10 novembre 1998
Par Thomas W P Slatin - Publié sur Amazon.com
Format: Broché Achat vérifié
This is the best book about Java cryptography I have ever seen. Believe me, as a web developer, I've seen and read many books. This one is by far the most useful, and most affordable. I definately recommend it to anyone who is serious about Java security!
5.0 étoiles sur 5 Review of Java Cryptography/Jonathan Knudsen 10 avril 2009
Par 3+4=5 - Publié sur Amazon.com
Format: Broché
Java Cryptography (Java Series)

The book is written very well. It starts simple with explanations of principles of Cryptography and shows its usage on simple examples. Then Java Sun classes for Cryptography are presented and again their usage is demonstrated on examples which are never difficult to understand and thoroughly commented. Then more theory and more examples follow. Terms used and explained are Keys, Key Generators and Translators, Authentication, Integrity, Encryption, Signatures, Certificates.

The strength of the book is in the fact that the reader is able to start with Java Cryptography rather fast. The examples are easy to understand and fully explained. The book is not trivial and it is good to know something about random number generators and have a good grasp of Java programming and Java socket programming in particular, even knowledge of awt GUI principles is useful. Java professionals who intend to devote their work to Cryptography should find this book very helpful.

The coverage of this book ends with JDK 1.2 - we have JDK 1.6 now when this review is being written. It actually may be a strength. Instead of trying to grasp latest software features attention may be more diverted to principles which is always a good thing. Generally, I would recommend this book
21 internautes sur 21 ont trouvé ce commentaire utile 
3.0 étoiles sur 5 Written for those without prior crypto experience 28 novembre 1998
Par Un client - Publié sur Amazon.com
Format: Broché
This book is intended to teach experienced Java programmers how to add cryptographic elements to their applications. The text is not intended to teach encryption algorithms, basic Java programming, or the overall Java security model: there are other books that fulfill those functions. There is one other limitation: much of the book relies on the Java Cryptography Extensions (JCE) which are only available to those in the United States and Canada (nudge, nudge, wink, wink).
Chapter one lists some fundamentals of encryption and the relationship to security. There are also a couple of programs right off the bat that will let you explore message digests, and encrypting and decrypting messages. The basics of confidentiality, authentication, and some major cryptographic algorithms are outlined in chapter two. The explanations are quite terse, but not out of line with the aim of the book. Java Security Architecture (JCA) is explained in chapter three, along with a quick overview of the API (Application Programming Interface) and SPI (Service Provider Interface). Chapter four introduces Java's own pseudo-random number generator, plus programming for key seeds from keyboard timing. Key management, in chapter five, is somewhat weak. The APIs only deal with hierarchical key certification, but this may simply be an example of Knudsen dealing strictly with the language, and leaving the concepts to others. I was, however, bemused at some passages that may have suffered from a lack of copy editing: for example, one section that seemed to confuse production of Message Authentication Codes with working on Macintosh computers. Authentication of various types is covered quite well in chapter six. Chapter seven's guide to encryption covers details not normally dealt with in cryptography texts because it must handle all matters related to getting an encryption algorithm to actually function in an application.
Chapter eight gives enough detail about signed applets to prove that they are going to be browser specific for a while. Security provider programming is covered in chapter nine, using the ElGamal algorithm as an example. A sample application is created using an encrypted version of the talk utility in chapter ten. An e-mail application is created in chapter eleven using th provider previously generated in chapter nine. Chapter twelve closes off by looking at security design for the system overall.
Appendices review BigInteger arithmetic in Java, the Base64 encoding scheme (an option for converting binary objects to text characters for e-mailing), Java archive files, Javakey, and a quick reference for the Java cryptography classes as covered in the book.
Knudsen states that the book is written, as far as possible, without assuming any prior knowledge of cryptography. In this aim he succeeds rather well. The programmer with no background in encryption can still add a reasonable layer of security to his or her application. Those who study further, of course, will be able to ensure a higher level of protection and reliability.
Ces commentaires ont-ils été utiles ? Dites-le-nous

Rechercher des articles similaires par rubrique