Flylib.com
Beginning Cryptography with Java
ISBN: 0764596330
EAN: 2147483647
Year: 2003
Pages: 145
Authors:
David Hook
BUY ON AMAZON
Introduction
The JCA and the JCE
Symmetric Key Cryptography
Message Digests, MACs, and HMACs
Asymmetric Key Cryptography
Object Description in Cryptography Using ASN.1
Distinguished Names and Certificates
Certificate Revocation and Path Validation
Key and Certificate Management Using Keystores
CMS and S/MIME
SSL and TLS
Appendix A Solutions to Exercises
Appendix B Algorithms Provided by the Bouncy Castle Provider
Appendix C Using the Bouncy Castle API for Elliptic Curve
Beginning Cryptography with Java
ISBN: 0764596330
EAN: 2147483647
Year: 2003
Pages: 145
Authors:
David Hook
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Database Modeling
Getting Started
Conceptual Model Reports
Editing Logical Models”Intermediate Aspects
Other Features and Best Practices
MySQL Stored Procedure Programming
Triggers
Calling a Stored Procedure from PHP
Using MySQL Stored Programs with PHP
Stored Programs as an Alternative to Expensive SQL
Recursion
VBScript Programmers Reference
Classes in VBScript (Writing Your Own COM Objects)
Server-Side Web Scripting
Appendix F The Scripting Runtime Library Object Reference
Appendix K The Variant Subtypes
Appendix L ActiveX Data Objects
The Complete Cisco VPN Configuration Guide
SSL VPNs
Connection Modes
Router Deployment Scenarios
Router Product Overview
Router ISAKMP/IKE Phase 1 Connectivity
Cisco IOS Cookbook (Cookbooks (OReilly))
Manipulating DR Selection
Enabling OSPF Authentication
Using STUN
Using Route Maps to Refine Static Translation Rules
Expect
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the Authentication Process
Indirect Privilege Escalation
Accessing the File System
Accessing the Network
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies