Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
298 Chapter 7 • Securing Your Java Code
3. Finally, you can compare the signature against the message using
the public key.The algorithm for this also contained in the class
Signature.
Generating a Key Pair
Key pairs can be obtained over the Internet from many security compa-
nies, such as VeriSign or Thawte. In fact, most e-mail programs such as
Microsoft Outlook have options for digitally signing your mail to
authenticate messages sent by you. In the Options in Outlook, you can
click on a button that tells you how to obtain a digital ID from one of
many vendors (see Figure 7.15). By clicking on Digital IDs you can
also view a list of public keys you ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312