Published on June 2nd, 2015 📆 | 2510 Views ⚑
0Applying Java’s Cryptography
iSpeech
Learn how to control Java’s cryptographic features to protect your application and any data that you manage. This session explains what different cryptography features do, what threats are addressed by each feature, and where the configuration takes place. Topics include certificates, code signatures, authenticating dynamic JVM languages, TLS control, perfect forward security, and transparent JPA encryption.
Author:
Erik Costlow
Erik Costlow is a product manager in Oracle's Java Platform Group and a regular contributor to the Java Platform Group PM blog. Erik also works closely with industry on Oracle's Java Root Certificate Program to ensure highest program quality. Previously Erik was employed at HP where he influenced design of the Fortify security analysis suite used by software developers across the world.
View more trainings by Erik Costlow at https://www.parleys.com/author/erik-costlow
Find more related tutorials at https://www.parleys.com/category/developer-training-tutorials
2015-06-02 14:07:52
source
Gloss