While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how.
This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples....
Beginning Cryptography with Java
While cryptography can still be a controversial topic in the programming community, Java has weathered that...
Contributors: Samuel G. Armistead, Roger Boase, Charles Burnett, Alan Deyermond, John Edwards, Brenda Fish, T.J. Gorton, Richard Hitchcock, David Hook, Francisco Marcos Marin, Ralph Penny, Barry Taylor, Roger M. Walker, Milija Pavlovic
Contributors: Samuel G. Armistead, Roger Boase, Charles Burnett, Alan Deyermond, John Edwards, Brenda Fish, T.J. Gorton, Richard Hitchcock, David Hook...
Though we think of King Arthur as archetypically British, the spread of the Arthurian legends was international, extending, among other places, to the Iberian Peninsula, where they had a deep influence and inspired such literary works as the chivalric romances parodied by Cervantes in "Don Quixote." Iberia was also the conduit through which these legends travelled to the Americas. "The Arthur of the Iberians" explores not only medieval and Renaissance texts, but also modern Arthurian fiction, the global spread of the legends in the Spanish and Portuguese worlds, and the social impacts of...
Though we think of King Arthur as archetypically British, the spread of the Arthurian legends was international, extending, among other places, to the...