Toward the Solution

Solving a problem as complex as computer security needs a systematic and comprehensive approach. Before we get to that, let's talk about technologies that solve parts of the problem.

Enabling Technologies

A number of technologies, resources and processes have been developed to counter the threat of online security. Some of the prominent ones are discussed below:

Cryptography

The practice of keeping content secure from prying eyes is known as cryptography. A cryptographic algorithm or cipher is used to convert plain-text content to cipher-text through a process known as encryption and back to plaintext through the reverse process known as decryption. A key may be used during the encryption and decryption process. Algorithms ...

Get J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.