Hands-on cryptography with Java /

"Security is paramount for any application. Cryptography occurs all across software fields: it protects all HTTPS traffic between browsers, encrypts phone storage against prying eyes, and can even hide files inside other files through a technique called steganography. This course is for develop...

Full description

Saved in:
Bibliographic Details
Other Authors: Costlow, Erik (Speaker)
Format: Video
Language:English
Published: [Place of publication not identified] : Packt Publishing, 2019.
Subjects:
Online Access:CONNECT
CONNECT
LEADER 02760cgm a2200469 i 4500
001 in00006076525
006 m o c
007 cr cna||||||||
007 vz czazuu
008 190326s2019 xx 170 o vleng d
005 20220713131723.7
035 |a 1WRLDSHRon1090681092 
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d ERF  |d OCLCO  |d OCLCQ  |d OCLCO 
035 |a (OCoLC)1090681092 
037 |a CL0501000036  |b Safari Books Online 
050 4 |a QA76.73.J38 
049 |a TXMM 
100 1 |a Costlow, Erik,  |e speaker. 
245 1 0 |a Hands-on cryptography with Java /  |c Erik Costlow. 
264 1 |a [Place of publication not identified] :  |b Packt Publishing,  |c 2019. 
300 |a 1 online resource (1 streaming video file (2 hr., 49 min., 50 sec.)) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
338 |a other  |b vz  |2 rdacarrier 
511 0 |a Presenter, Erik Costlow. 
500 |a Title from resource description page (Safari, viewed March 22, 2019). 
520 |a "Security is paramount for any application. Cryptography occurs all across software fields: it protects all HTTPS traffic between browsers, encrypts phone storage against prying eyes, and can even hide files inside other files through a technique called steganography. This course is for developers looking to design a system that uses cryptography, rather than designing new algorithms. Most developers simply need to put the right pieces together to make their own system work. In this course, you will break down the concepts behind cryptography into simple lessons, covering terminology, algorithms, standards, and encryption/decryption techniques. We will also walk through how cryptographic systems are hacked to bypass (rather than break) their cryptographic capabilities."--Resource description page 
590 |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) 
650 0 |a Java (Computer program language) 
650 0 |a Cryptography. 
650 0 |a Computer security. 
650 0 |a Data encryption (Computer science) 
730 0 |a WORLDSHARE SUB RECORDS 
856 4 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781838554972/?ar  |z CONNECT  |3 O'Reilly  |t 0 
949 |a ho0 
994 |a 92  |b TXM 
998 |a wi 
999 f f |s a1d22854-820d-4951-9e1f-8a72820ceca9  |i e438c13f-fa28-402b-b5cd-36c06c334378  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 1  |e QA76.73.J38   |h Library of Congress classification 
856 4 0 |3 O'Reilly  |t 0  |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781838554972/?ar  |z CONNECT