O'Reilly logo

J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice by Pankaj Kumar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Toward the Solution

Solving a problem as complex as computer security needs a systematic and comprehensive approach. Before we get to that, let's talk about technologies that solve parts of the problem.

Enabling Technologies

A number of technologies, resources and processes have been developed to counter the threat of online security. Some of the prominent ones are discussed below:

Cryptography

The practice of keeping content secure from prying eyes is known as cryptography. A cryptographic algorithm or cipher is used to convert plain-text content to cipher-text through a process known as encryption and back to plaintext through the reverse process known as decryption. A key may be used during the encryption and decryption process. Algorithms ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required