O'Reilly logo

J2EE™ and Beyond: Design, Develop, and Deploy World-Class Java™ Software by Art Taylor

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Providing Security through Encryption

Java programs and components involve the manipulation of information in some form. In many cases, this information should be kept secure. Prior to rapid growth of the Internet, a common solution to keeping information secure was to create a secure point-to-point network, one in which it would be difficult or impossible for some untrusted third party to access the network.

Today, however, the use of the Internet for transfer of information is a very practical and cost-effective solution. What must be managed is the security and integrity of the information being transferred over the public network. This is accomplished by effectively hiding the information in plain sight through the application of cryptography. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required