Learn Java Cryptography.

Learn Java cryptography. Develop more secure Java applications using the Java Cryptography Architecture (JCA) and Java Cryptography Extensions (JCE) libraries.

Saved in:
Bibliographic Details
Corporate Author: linkedin.com (Firm)
Other Authors: P Moley III, Frank (Speaker)
Format: Video
Language:English
Published: Carpenteria, CA linkedin.com, 2018.
Subjects:
Online Access:CONNECT
CONNECT
LEADER 02871ngm a22004453i 4500
001 mig00005573299
006 m c
007 vz||zazu|
007 cr cna a
008 221006s2018 cau101 o vleng d
005 20221006154123.9
035 0 0 |a ocm00000001linkedinLDC674592 
035 |a linkedinLDC674592 
040 |a linkedin.com  |b eng 
050 4 |a LDC674592 
100 1 |a P Moley III, Frank  |e speaker. 
245 1 0 |a Learn Java Cryptography.  |c with Frank P Moley III 
264 1 |a Carpenteria, CA  |b linkedin.com,  |c 2018. 
300 |a 1 online resource 
306 |a 01h:41m:40s 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a video  |b v  |2 rdamedia 
337 |a computer  |b c  |2 rdamedia 
338 |a other  |b vz  |2 rdacarrier 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a 7/09/201812:00:00AM 
520 |a Learn Java cryptography. Develop more secure Java applications using the Java Cryptography Architecture (JCA) and Java Cryptography Extensions (JCE) libraries. 
511 1 |a Presenter: Frank P Moley III 
520 |a Security is paramount for any application. In Java, cryptography is key to the secure storage and transmission of data: to and from resources, users, and APIs. This course teaches the basics of Java cryptography using the Java Development Kit (JDK) crypto libraries: Java Cryptography Architecture (JCA) and Java Cryptography Extensions (JCE). Learn basic cryptography concepts and terms, including symmetric and asymmetric encryption, hashing, and digital signatures. Then find out how to use the cryptographic services or "engine classes" in JCA and JCE, such as Cipher, KeyGenerator, MessageDigest, and Signature, to enforce secure messaging and data storage. Plus, discover how to build a Java keystore to manage your repository of keys and certificates. Instructor Frank Moley uses his 16+ years of experience as a software developer and security architect to guide you through this complex topic. 
538 |a Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection. 
655 4 |a Instructional films.  |2 lcgft 
655 4 |a Educational films.  |2 lcgft 
710 2 |a linkedin.com (Firm) 
730 0 |a LinkedIn MTSU records 
856 4 0 |u https://www.linkedin.com/learning/learn-java-cryptography?u=36452436&auth=true  |z CONNECT  |3 LinkedIn.com  |t 0 
949 |a ho0 
998 |a wi 
999 f f |s d3aa1207-cdd7-46c4-9398-b89888fd4254  |i 4c947592-9dce-4538-90dd-3b5f660568f3  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 1  |e LDC674592   |h Library of Congress classification 
856 4 0 |3 LinkedIn.com  |t 0  |u https://www.linkedin.com/learning/learn-java-cryptography?u=36452436&auth=true  |z CONNECT