Buy new:
-32% $22.97$22.97
FREE delivery Friday, August 8 on orders shipped by Amazon over $35
Ships from: Amazon.com Sold by: Amazon.com
Save with Used - Good
$4.24$4.24
$3.98 delivery Tuesday, August 12
Ships from: glenthebookseller Sold by: glenthebookseller

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Java Cryptography Extensions: Practical Guide for Programmers (The Practical Guides) 1st Edition
Purchase options and add-ons
For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and it’s imperative that developers know what kinds of solutions exist.
One of Java’s solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few.
In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesn’t overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE.
- ISBN-100127427511
- ISBN-13978-0127427515
- Edition1st
- PublisherMorgan Kaufmann
- Publication dateMarch 12, 2004
- LanguageEnglish
- Dimensions7.25 x 0.4 x 10.25 inches
- Print length176 pages
Editorial Reviews
Review
"I think it's worth having a copy of this book in the company library." - Dr Dobb's Journal, November 2004
"No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE." Stefan Meyer (Berlin) Zentralblatt MATH 1060, November 2005
From the Back Cover
For many Java developers and software engineers, cryptography is an on-demand? programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and it s imperative that developers know what kinds of solutions exist.
One of Java s solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few.
In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesn t overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE.
Features:
· Written by a seasoned veteran of both cryptography and server-side programming
· Covers the architecture of the JCA, JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates
About the Author:
Jason Weiss is a Senior Architect with Sybase where he research using Java, J2EE and Microsoft .NET in support of the companies goals. Previously he served in the U.S. Navy as a Cryptologic Technician and has worked closely with the NSA and several other U.S. Department of Defense agencies. He can be reached via email at jasonweiss@yahoo.com.|"For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM
For many Java developers and software engineers, cryptography is an on-demand programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and it s imperative that developers know what kinds of solutions exist.
One of Java s solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few.
In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesn t overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE.
Features:
· Written by a seasoned veteran of both cryptography and server-side programming
· Covers the architecture of the JCA, JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates
· Includes a companion web site that contains the code for the examples in the book, open-source cryptographic toolkits, and further resources
About the Author:
Jason Weiss is a Senior Architect with Sybase where he research using Java, J2EE and Microsoft .NET in support of the companies goals. Previously he served in the U.S. Navy as a Cryptologic Technician and has worked closely with the NSA and several other U.S. Department of Defense agencies. He can be reached via email at jasonweiss@yahoo.com.
Product details
- Publisher : Morgan Kaufmann
- Publication date : March 12, 2004
- Edition : 1st
- Language : English
- Print length : 176 pages
- ISBN-10 : 0127427511
- ISBN-13 : 978-0127427515
- Item Weight : 12.8 ounces
- Dimensions : 7.25 x 0.4 x 10.25 inches
- Part of series : The Morgan Kaufmann Series in Data Management Systems
- Best Sellers Rank: #4,531,002 in Books (See Top 100 in Books)
- #1,132 in Management Information Systems
- #1,223 in Computer Cryptography
- #1,229 in Web Encryption
- Customer Reviews:
About the author

Discover more of the author’s books, see similar authors, read book recommendations and more.
Customer reviews
- 5 star4 star3 star2 star1 star5 star55%0%33%12%0%55%
- 5 star4 star3 star2 star1 star4 star55%0%33%12%0%0%
- 5 star4 star3 star2 star1 star3 star55%0%33%12%0%33%
- 5 star4 star3 star2 star1 star2 star55%0%33%12%0%12%
- 5 star4 star3 star2 star1 star1 star55%0%33%12%0%0%
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonTop reviews from the United States
There was a problem filtering reviews. Please reload the page.
- Reviewed in the United States on October 1, 2009This is an excellent book for those who understand the theory behind cryptography, digital signatures, certificates, etc, and just want to start implementing all these things using Java fast. This is not an exhaustive cookbook, though, covering all possible situations but rather a quick start guide that allows a person with no previous experience in JCA and JCE to implement encryption/decryption, hashing or digital signature generation/verification in minutes. One of the very rare books where not every page but every line is to the point and one doesn't have to filter out annoying discussions looking for useful information.
- Reviewed in the United States on April 7, 2006The book has good introduction material the examples described in the book are bit old and some of the classes are deprecated. The book also needs an update to include newer features of JCE and JSSE. I hurried up to buy this book and then realized it is bit outdated. Now I have Core security patterns by chris steel which covers well on cryptography api and examples using j2se 5.0 and j2ee 1.4 as well.
- Reviewed in the United States on October 4, 2005What's wrong with this book? There is no thorough explanation of the concepts of cryptography, he just starts off taking shotcuts and with code examples that are absolutely not mature.
I have a theoretical background in cryptography, but often had to read the text many times over before I could understand what the author was trying to say.
This is the starting point for a practical guide on java cryptography, an introduction, but by no means enough.
I would have considered giving it 3 stars, weren't it not that het appendix A on Base64coding, another topic that the author doesn't treat, is completely missing !