Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 (Record no. 32411)

000 -LEADER
fixed length control field nam a22 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230830b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781484281048
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Item number NIT
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Nita, Stefania Loredana
245 ## - TITLE STATEMENT
Title Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc Apress,
Date of publication, distribution, etc 2022
Place of publication, distribution, etc New York :
300 ## - PHYSICAL DESCRIPTION
Extent xi, 227p. ;
Other physical details ill.,
Dimensions 25 cm
365 ## - TRADE PRICE
Price amount 34.99
Price type code EUR
Unit of pricing 94.90
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more. The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes. The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter. What You Will Learn Develop programming skills for writing cryptography algorithms in Java Dive into security schemes and modules using Java Explore "good" vs "bad" cryptography based on processing execution times and reliability Play with pseudo-random generators, hash functions, etc. Leverage lattice-based cryptography methods, the NTRU framework library, and more Who This Book Is For Those who want to learn and leverage cryptography and cryptanalysis using Java. Some prior Java and/or algorithm programming exposure is highly recommended.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Topical term or geographic name as entry element Data encryption
Topical term or geographic name as entry element Java
Topical term or geographic name as entry element Cryptography
Topical term or geographic name as entry element IT security
Topical term or geographic name as entry element Computer program language
Topical term or geographic name as entry element Pseudo-random-generators
Topical term or geographic name as entry element Hash functions
Topical term or geographic name as entry element Leverage Lattice-based cryptography methods
Topical term or geographic name as entry element NTRU framework library
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Mihailescu, Marius Iulian
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Cost, normal purchase price Full call number Barcode Date last seen Koha item type
          DAIICT DAIICT 2023-08-25 3320.55 005.82 NIT 034096 2023-08-30 Books

Powered by Koha