Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
Securing Your Java Code • Chapter 7 293
That is a lot of unique fingerprints that can be produced (in fact, the
number is impossible to comprehend), but this also means that there are
some messages that will have the same fingerprint.This is really nothing
to be worried about in practical terms, however, because it would be
extremely rare for two messages to have the same fingerprint. Even more
important, it is not possible to modify a message and still produce the
same fingerprint as the original. If we change just one byte in a message
the fingerprint will be radically different from the original fingerprint.
Actually, three algorithms in the Java SDK can ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312