• Tutti i prezzi includono l'IVA.
Disponibilità: solo 3 --ordina subito (ulteriori in arrivo).
Venduto e spedito da Amazon. Confezione regalo disponibile.
Java Cryptography è stato aggiunto al tuo carrello

Spedire a:
Per vedere gli indirizzi, per favore
Oppure
Inserisci un codice postale corretto.
Oppure
+ EUR 2,90 spedizione in Italia
Usato: Ottime condizioni | Dettagli
Venduto da worldofbooksit
Condizione: Usato: Ottime condizioni
Commento: Book has been read but is in excellent condition. No missing or damaged pages. Maybe some identifying marks on the inside cover. Quality guaranteed from the largest seller of used books online.
Ne hai uno da vendere?
Passa al retro Passa al fronte
Ascolta Riproduzione in corso... In pausa   Stai ascoltando un campione dell'edizione audio udibile.
Maggiori informazioni
Visualizza l'immagine

Java Cryptography (Inglese) Copertina flessibile – 1 mag 1998

3,1 su 5 stelle
5 stelle
5
4 stelle
5
3 stelle
2
2 stelle
1
1 stella
6
3,1 su 5 stelle 19 recensioni clienti su Amazon.com

Visualizza tutti i 4 formati e le edizioni Nascondi altri formati ed edizioni
Prezzo Amazon
Nuovo a partire da Usato da
Formato Kindle
"Ti preghiamo di riprovare"
Copertina flessibile
"Ti preghiamo di riprovare"
EUR 37,44
EUR 29,77 EUR 5,10
Nota: Questo articolo può essere consegnato in un punto di ritiro. Dettagli
Ritira il tuo ordine dove e quando preferisci.
  • Scegli tra gli oltre 8.500 punti di ritiro in Italia
  • I clienti Prime beneficiano di consegne illimitate presso i punti di ritiro senza costi aggiuntivi
Come inviare un ordine presso un punto di ritiro Amazon.
  1. Trova il tuo punto di ritiro preferito ed aggiungilo alla tua rubrica degli indirizzi
  2. Indica il punto di ritiro in cui vuoi ricevere il tuo ordine nella pagina di conferma d’ordine
Maggiori informazioni
click to open popover

Descrizione prodotto

L'autore

Jonathan Knudsen is an author at O'Reilly & Associates. His books include The Unofficial Guide to Lego Mindstorms Robots, Java 2D Graphics, and Java Cryptography. He is the Courseware Writer for LearningPatterns.com.

Non è necessario possedere un dispositivo Kindle. Scarica una delle app Kindle gratuite per iniziare a leggere i libri Kindle sul tuo smartphone, tablet e computer.

  • Apple
  • Android
  • Windows Phone

Per scaricare una app gratuita, inserisci il numero di cellulare.



Dettagli prodotto

Recensioni clienti

Non ci sono ancora recensioni di clienti su Amazon.it
5 stelle
4 stelle
3 stelle
2 stelle
1 stella

Le recensioni clienti più utili su Amazon.com (beta) (Potrebbero essere presenti recensioni del programma "Early Reviewer Rewards")

Amazon.com: 3.1 su 5 stelle 19 recensioni
1.0 su 5 stelle Not terribly useful and somewhat misleading 29 dicembre 2013
Di Amazon Customer - Pubblicato su Amazon.com
Formato: Formato Kindle Acquisto verificato
I was expecting essentially a Java version of Schneiers Applied Cryptography where proven crypto algorithms are reimplelemented in Java. This book seems to be more focused on teaching readers how to implement the author's toy crypto algorithms. Readers would be better off reading Cryptography Engineering and learning the Java BouncyCastle libraries.
1 di 1 persone hanno trovato utile la seguente recensione
1.0 su 5 stelle A recent Kindle release date, does not a relevant book make 10 maggio 2013
Di Rob L - Pubblicato su Amazon.com
Formato: Formato Kindle Acquisto verificato
I bought the Kindle version of this book based on the reasonably recent release date. It turned out to be a decade older than that. Technical books do not age like wine, they age like cheese. Stinking, mouldy, worthless cheese.
1 di 4 persone hanno trovato utile la seguente recensione
5.0 su 5 stelle Best Java Cryptography Book Ever! 10 novembre 1998
Di Thomas W P Slatin - Pubblicato su Amazon.com
Formato: Copertina flessibile Acquisto verificato
This is the best book about Java cryptography I have ever seen. Believe me, as a web developer, I've seen and read many books. This one is by far the most useful, and most affordable. I definately recommend it to anyone who is serious about Java security!
5.0 su 5 stelle Review of Java Cryptography/Jonathan Knudsen 10 aprile 2009
Di 3+4=5 - Pubblicato su Amazon.com
Formato: Copertina flessibile
Java Cryptography (Java Series)

The book is written very well. It starts simple with explanations of principles of Cryptography and shows its usage on simple examples. Then Java Sun classes for Cryptography are presented and again their usage is demonstrated on examples which are never difficult to understand and thoroughly commented. Then more theory and more examples follow. Terms used and explained are Keys, Key Generators and Translators, Authentication, Integrity, Encryption, Signatures, Certificates.

The strength of the book is in the fact that the reader is able to start with Java Cryptography rather fast. The examples are easy to understand and fully explained. The book is not trivial and it is good to know something about random number generators and have a good grasp of Java programming and Java socket programming in particular, even knowledge of awt GUI principles is useful. Java professionals who intend to devote their work to Cryptography should find this book very helpful.

The coverage of this book ends with JDK 1.2 - we have JDK 1.6 now when this review is being written. It actually may be a strength. Instead of trying to grasp latest software features attention may be more diverted to principles which is always a good thing. Generally, I would recommend this book
21 di 21 persone hanno trovato utile la seguente recensione
3.0 su 5 stelle Written for those without prior crypto experience 28 novembre 1998
Di Un cliente - Pubblicato su Amazon.com
Formato: Copertina flessibile
This book is intended to teach experienced Java programmers how to add cryptographic elements to their applications. The text is not intended to teach encryption algorithms, basic Java programming, or the overall Java security model: there are other books that fulfill those functions. There is one other limitation: much of the book relies on the Java Cryptography Extensions (JCE) which are only available to those in the United States and Canada (nudge, nudge, wink, wink).
Chapter one lists some fundamentals of encryption and the relationship to security. There are also a couple of programs right off the bat that will let you explore message digests, and encrypting and decrypting messages. The basics of confidentiality, authentication, and some major cryptographic algorithms are outlined in chapter two. The explanations are quite terse, but not out of line with the aim of the book. Java Security Architecture (JCA) is explained in chapter three, along with a quick overview of the API (Application Programming Interface) and SPI (Service Provider Interface). Chapter four introduces Java's own pseudo-random number generator, plus programming for key seeds from keyboard timing. Key management, in chapter five, is somewhat weak. The APIs only deal with hierarchical key certification, but this may simply be an example of Knudsen dealing strictly with the language, and leaving the concepts to others. I was, however, bemused at some passages that may have suffered from a lack of copy editing: for example, one section that seemed to confuse production of Message Authentication Codes with working on Macintosh computers. Authentication of various types is covered quite well in chapter six. Chapter seven's guide to encryption covers details not normally dealt with in cryptography texts because it must handle all matters related to getting an encryption algorithm to actually function in an application.
Chapter eight gives enough detail about signed applets to prove that they are going to be browser specific for a while. Security provider programming is covered in chapter nine, using the ElGamal algorithm as an example. A sample application is created using an encrypted version of the talk utility in chapter ten. An e-mail application is created in chapter eleven using th provider previously generated in chapter nine. Chapter twelve closes off by looking at security design for the system overall.
Appendices review BigInteger arithmetic in Java, the Base64 encoding scheme (an option for converting binary objects to text characters for e-mailing), Java archive files, Javakey, and a quick reference for the Java cryptography classes as covered in the book.
Knudsen states that the book is written, as far as possible, without assuming any prior knowledge of cryptography. In this aim he succeeds rather well. The programmer with no background in encryption can still add a reasonable layer of security to his or her application. Those who study further, of course, will be able to ensure a higher level of protection and reliability.