• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10 » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10

ISBN-13: 9781484281048 / Angielski / Miękka / 2022

Marius Iulian Mihailescu
Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10 Mihailescu, Marius Iulian 9781484281048 Apress - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10

ISBN-13: 9781484281048 / Angielski / Miękka / 2022

Marius Iulian Mihailescu
cena 201,72 zł
(netto: 192,11 VAT:  5%)

Najniższa cena z 30 dni: 173,46 zł
Termin realizacji zamówienia:
ok. 8-10 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more.The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes.
The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter.  
 What You Will Learn

  • Develop programming skills for writing cryptography algorithms in Java
  • Dive into security schemes and modules using Java
  • Explore “good” vs “bad” cryptography based on processing execution times and reliability
  • Play with pseudo-random generators, hash functions, etc.
  • Leverage lattice-based cryptography methods, the NTRU framework library, and more
 Who This Book Is ForThose who want to learn and leverage cryptography and cryptanalysis using Java. Some prior Java and/or algorithm programming exposure is highly recommended.

Intermediate user level

Kategorie:
Informatyka, Programowanie
Kategorie BISAC:
Computers > Languages - Java
Computers > Security - Cryptography & Encryption
Computers > Computer Science
Wydawca:
Apress
Język:
Angielski
ISBN-13:
9781484281048
Rok wydania:
2022
Waga:
0.46 kg
Wymiary:
25.4 x 17.8
Oprawa:
Miękka
Dodatkowe informacje:
Wydanie ilustrowane

Chapter 01 – Introduction

Chapter 02 – JDK 17: Java 17 New Features
Chapter 03 – Road to Jakarta EE10 and Security Mechanisms
Chapter 04 – Java Cryptography Architecture (java.security.*)
Chapter 05 – Classical Cryptography
5.1. Some Simple Cryptosystems
5.1.1. Shift Cipher (Caesar)
5.1.2. Substitution Cipher
5.1.3. Affine Cipher
5.1.4. Vigenere Cipher
5.1.5. Hill Cipher
5.1.6. Transposition Cipher
5.1.7. Columnar Transposition Cipher
5.1.8. Rail Fence Cipher
5.1.9. Stream Ciphers
5.2. Cryptanalysis
5.2.1. Cryptanalysis of Caesar
5.2.2. Cryptanalysis of Affine Cipher
5.2.3. Cryptanalysis of Substitution Cipher
5.2.4. Cryptanalysis of Vigenere Cipher
5.2.5. Known Plaintext Attack on the Hill Cipher
Chapter 06. Formal Techniques for Cryptography
6.1. Galois Fields
6.2. Elliptic Curves
Chapter 07. Pseudo-random Generators
Chapter 08. Hash Functions
8.1. MessageDigest Java Class
8.2. Common Hash Functions
8.2.1. SHA-3 Keccak Hash Functions
8.2.2. SHA-2 Cryptography Hash Functions Family
8.2.2.1. SHA-512
8.2.2.2. SHA-384
8.2.2.3. SHA-256
8.2.2.4. SHA-224
8.2.3. MD Hash Functions
8.2.3.1. MD2
8.2.3.2. MD4
8.2.3.3. MD5
8.2.3.4. MD6
8.2.4. RIPEMD
8.2.5. SWIFT
8.2.6. WHIRLPOOL
8.2.7. BLAKE
8.2.8. Collisions Hash Functions
8.2.9. Birthday Attack
Chapter 09 – Symmetric Encryption Algorithms
9.1. Case Study: The Data Encryption Standard (DES)
9.1.1. Linear and Differential Cryptanalysis for DES
9.2. Advanced Encryption Standard (AES)
Chapter 10 – Asymmetric Encryption Schemes
10.1. RSA
10.2. El Gamal 
10.3. Merkle-Hellman Knapsack System
10.4. McEliece System
Chapter 11 – Signature Schemes
11.1. Digital Signature Standard
11.2. El Gamal Signature
11.3. Undeniable Signatures
Chapter 12 – Identification Schemes
Chapter 13 – Lattice-based Cryptography and NTRU
Chapter 14 – Modern/Advanced Encryption Schemes
14.1. Homomorphic Encryption
14.2. Searchable Encryption
Chapter 15 – Cryptography Tools 

Stefania Loredana Nita, PhD, is a software developer at the Institute of Computer Science of the Romanian Academy and a PhD with her thesis on advanced cryptographic schemes using searchable encryption and homomorphic encryption. She has served more than two years as an assistant lecturer at the University of Bucharest where she taught courses on subjects such as advanced programming techniques, simulation methods, and operating systems. She has authored and co-authored more than 15 work papers for conferences and journals, and has authored two books on he Haskell programming language. She is a lead guest editor for special issues on information security and cryptography such as advanced cryptography and its future: searchable and homomorphic encryption. She holds an MSc in software engineering and two BSc in computer science and mathematics.

Marius Iulian Mihailescu, PhD is CEO at Dapyx Solution Ltd., a company based in Bucharest, Romania. He is involved in information security- and cryptography-related research projects. He is a lead guest editor for applied cryptography journals and a reviewer for multiple publications with information security and cryptography profiles. He authored and co-authored more than 30 articles for conference proceedings, 25 articles in journals, and three books. For more than six years he has served as a lecturer at well-known national and international universities (University of Bucharest, “Titu Maiorescu” University, Kadir Has University in, Istanbul, Turkey). He has taught courses on programming languages (C#, Java, C++, Haskell), and object-oriented system analysis and design with UML, graphs, databases, cryptography, and information security. He served for three years as IT officer at Royal Caribbean Cruises Ltd. where he dealt with IT infrastructure, data security, and satellite communications systems. He received his PhD in 2014 and his thesis was on applied cryptography over biometric data. He holds two MSc in information security and software engineering.

Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more.

The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes.

The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter.  

What You Will Learn

  • Develop programming skills for writing cryptography algorithms in Java
  • Dive into security schemes and modules using Java
  • Explore “good” vs “bad” cryptography based on processing execution times and reliability
  • Play with pseudo-random generators, hash functions, etc.
  • Leverage lattice-based cryptography methods, the NTRU framework library, and more

 




Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia