1 / 33
文档名称:

java安全手册指南.pdf

格式:pdf   大小:122KB   页数:33页
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

分享

预览

java安全手册指南.pdf

上传人:qucheng26364 2021/11/26 文件大小:122 KB

下载得到文件列表

java安全手册指南.pdf

文档介绍

文档介绍:Java security, Part 1: Crypto basics
Presented by developerWorks, your source for great tutorials

Table of Contents
If you're viewing this document online, you can click any of the topics below to link directly to that section.
1. About this tutorial....................................................... 2
2. Java security programming concepts............................... 4
3. Ensuring the integrity of a message ................................ 7
4. Keeping a message confidential..................................... 11
5. Secret messages with public keys .................................. 15
6. Signatures without paper ............................................. 18
7. Proving you are who you are......................................... 23
8. Trusting the code....................................................... 26
9. SSL/TLS: Securing C/S communication............................ 28
10. Wrapup and resources............................................... 31
Java security, Part 1: Crypto basics Page 1 of 33
Presented by developerWorks, your source for great tutorials
Section 1. About this tutorial
What is this tutorial about?
There is perhaps no software engineering topic of more timely importance than application
security. Attacks are costly, whether the attack comes from inside or out, and some attacks
can expose a software company to liability for damages. As computer (and especially
Internet) technologies evolve, security attacks are becoming more sophisticated and
frequent. Staying on top of the most up-to-date techniques and tools is one key to application
security; the other is a solid foundation in proven technologies such as data encryption,
authentication, and authorization.
The Java platform, both the basic language and library extensions, provides an excellent
foundation for writing secure applications. This tutorial