Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
Developing Security-Enabled Applications • Chapter 11 481
3. Now a cryptographic cipher must be created for the key pair
and the key length must be specified.The longer the key, the
stronger the security the key pair represents.After key length is
defined (see Figure 11.22), click Next to continue.
A hashing algorithm for authentication must be selected
next.The default algorithm is SHA1. Click Next to accept the
default and continue.
4. The certificate extensions screen allows you to select the type of
certificates you can issue and sign with your CA.We select the
types that best suit our purpose, as shown in Figure 11.23. Click
Next to continue.
5. You ar ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312