Cargando…

Hands-on cryptography with Java /

"Security is paramount for any application. Cryptography occurs all across software fields: it protects all HTTPS traffic between browsers, encrypts phone storage against prying eyes, and can even hide files inside other files through a technique called steganography. This course is for develop...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Costlow, Erik (Orador)
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Packt Publishing, 2019.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000 i 4500
001 OR_on1090681092
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 190326s2019 xx 170 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d ERF  |d OCLCO  |d OCLCQ  |d OCLCO 
029 1 |a AU@  |b 000066234754 
035 |a (OCoLC)1090681092 
037 |a CL0501000036  |b Safari Books Online 
050 4 |a QA76.73.J38 
049 |a UAMI 
100 1 |a Costlow, Erik,  |e speaker. 
245 1 0 |a Hands-on cryptography with Java /  |c Erik Costlow. 
264 1 |a [Place of publication not identified] :  |b Packt Publishing,  |c 2019. 
300 |a 1 online resource (1 streaming video file (2 hr., 49 min., 50 sec.)) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
511 0 |a Presenter, Erik Costlow. 
500 |a Title from resource description page (Safari, viewed March 22, 2019). 
520 |a "Security is paramount for any application. Cryptography occurs all across software fields: it protects all HTTPS traffic between browsers, encrypts phone storage against prying eyes, and can even hide files inside other files through a technique called steganography. This course is for developers looking to design a system that uses cryptography, rather than designing new algorithms. Most developers simply need to put the right pieces together to make their own system work. In this course, you will break down the concepts behind cryptography into simple lessons, covering terminology, algorithms, standards, and encryption/decryption techniques. We will also walk through how cryptographic systems are hacked to bypass (rather than break) their cryptographic capabilities."--Resource description page 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Java (Computer program language) 
650 0 |a Cryptography. 
650 0 |a Computer security. 
650 0 |a Data encryption (Computer science) 
650 6 |a Java (Langage de programmation) 
650 6 |a Cryptographie. 
650 6 |a Sécurité informatique. 
650 6 |a Chiffrement (Informatique) 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Cryptography.  |2 fast  |0 (OCoLC)fst00884552 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
650 7 |a Java (Computer program language)  |2 fast  |0 (OCoLC)fst00982065 
655 4 |a Electronic videos. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781838554972/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP