Description

Book Synopsis
Beginning Cryptography with Java While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how.

Table of Contents
Acknowledgments.

Introduction.

Chapter 1: The JCA and the JCE.

Chapter 2: Symmetric Key Cryptography.

Chapter 3: Message Digests, MACs, and HMACs.

Chapter 4: Asymmetric Key Cryptography.

Chapter 5: Object Description in Cryptography Using ASN.1.

Chapter 6: Distinguished Names and Certificates.

Chapter 7: Certificate Revocation and Path Validation.

Chapter 8: Key and Certificate Management Using Keystores.

Chapter 9: CMS and S/MIME.

Chapter 10: SSL and TLS.

Appendix A: Solutions to Exercises.

Appendix B: Algorithms Provided by the Bouncy Castle Provider.

Appendix C: Using the Bouncy Castle API for Elliptic Curve.

Appendix D: Bibliography and Further Reading.

Index.

Beginning Cryptography with Java

Product form

£22.49

Includes FREE delivery

RRP £24.99 – you save £2.50 (10%)

Order before 4pm tomorrow for delivery by Sat 17 Jan 2026.

A Paperback by David Hook

15 in stock


    View other formats and editions of Beginning Cryptography with Java by David Hook

    Publisher: Wiley
    Publication Date: 8/19/2005 12:00:00 AM
    ISBN13: 9780764596339, 978-0764596339
    ISBN10: 0764596330

    Description

    Book Synopsis
    Beginning Cryptography with Java While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how.

    Table of Contents
    Acknowledgments.

    Introduction.

    Chapter 1: The JCA and the JCE.

    Chapter 2: Symmetric Key Cryptography.

    Chapter 3: Message Digests, MACs, and HMACs.

    Chapter 4: Asymmetric Key Cryptography.

    Chapter 5: Object Description in Cryptography Using ASN.1.

    Chapter 6: Distinguished Names and Certificates.

    Chapter 7: Certificate Revocation and Path Validation.

    Chapter 8: Key and Certificate Management Using Keystores.

    Chapter 9: CMS and S/MIME.

    Chapter 10: SSL and TLS.

    Appendix A: Solutions to Exercises.

    Appendix B: Algorithms Provided by the Bouncy Castle Provider.

    Appendix C: Using the Bouncy Castle API for Elliptic Curve.

    Appendix D: Bibliography and Further Reading.

    Index.

    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account