Categories
Technical
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Share With Friends
Archive by Date
2012-08-06
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
Search Tag
Aardvarks
radiologique
DANNY
Pertains
Foultitude
Vipertones
Dentures
Veracini
津田魔法
Drella
Terauchi
必修课
FlashGet
交互
EWMF
Mixu
Nicotine
112dB
李柏林
ROMINA
Deny
2275
Embedding
Anywere
TINTIN
Jugadores
亿万富翁
Jindrich
Breckenridge
Mush
Strathern
Tauchen
drber
竞争情报
Finite
Witchi
rarchie
Beranek
Finland
Graft
fcil
Nearby
Nahum
Hector
Greuel
usler
Fitch
2Play
Croisile
Injure
Newest
Core Java, Vol. 2 - Advanced Features
JavaScript - The Good Parts
Cynthia Bloch, "MIDP 2.0 Style Guide for the Java 2 Platform" (Repost)
Java How to Program (early objects), 9th Edition
JavaFX 2.0 - Introduction by Example
OSGi and Equinox - Creating Highly Modular Java Systems
Absolute Java (5th Edition) [Repost]
Tutsplus - JavaScript Fundamentals 101 (2012)
The Java EE 6 Tutorial - Basic Concepts (4th Edition)
Modern JavaScript - Develop and Design
CoffeeScript - Accelerated JavaScript Development
Beginning iPhone and iPad Web Apps - Scripting with HTML5, CSS3, and JavaScript
Modern JavaScript: Develop and Design
CoffeeScript: Accelerated JavaScript Development (Repost)
Programmieren lernen mit Java Aktuell zu Java 7
Absolute Java
Continuous Testing - with Ruby, Rails, and JavaScript
Beginning iPhone and iPad Web Apps: Scripting with HTML5, CSS3, and JavaScript (Repost)
Plug-In JavaScript 100 Power Solutions [Repost]
Sams Teach Yourself Java 6 in 21 Days (5th Edition) (Repost)
JavaScript - The Good Parts
Cynthia Bloch, "MIDP 2.0 Style Guide for the Java 2 Platform" (Repost)
Java How to Program (early objects), 9th Edition
JavaFX 2.0 - Introduction by Example
OSGi and Equinox - Creating Highly Modular Java Systems
Absolute Java (5th Edition) [Repost]
Tutsplus - JavaScript Fundamentals 101 (2012)
The Java EE 6 Tutorial - Basic Concepts (4th Edition)
Modern JavaScript - Develop and Design
CoffeeScript - Accelerated JavaScript Development
Beginning iPhone and iPad Web Apps - Scripting with HTML5, CSS3, and JavaScript
Modern JavaScript: Develop and Design
CoffeeScript: Accelerated JavaScript Development (Repost)
Programmieren lernen mit Java Aktuell zu Java 7
Absolute Java
Continuous Testing - with Ruby, Rails, and JavaScript
Beginning iPhone and iPad Web Apps: Scripting with HTML5, CSS3, and JavaScript (Repost)
Plug-In JavaScript 100 Power Solutions [Repost]
Sams Teach Yourself Java 6 in 21 Days (5th Edition) (Repost)
Useful Links
Beginning Cryptography with Java
Posted on 2010-03-15
|
ebookspyder.net
Book Description: While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME. What you will learn from this book How to understand and use JCE, JCA, and the JSSE for encryption and authentication The ways in which padding mechanisms work in ciphers and how to spot and fix typical errors An understanding of how authentication mechanisms are implemented in Java and why they are used Methods for describing cryptographic objects with ASN.1 How to create certificate revocation lists and use the Online Certificate Status Protocol (OCSP) Real-world Web solutions using Bouncy Castle APIs Book Info: Published in 2005 Published by Wrox Press Author David Hook ISBN 0764596330 Size 2.50MB Alternative Link:
Rating:
2.5 out of 5 by Book123 |
Download Links | |
Server | Status |
---|---|
Direct Download Link 1 | Alive |
Direct Download Link 2 | Alive |
Download Link (Link2) | Alive |
Buy This Book at Best Price >> |
Like this article?! Give us +1: