Videos

Published on June 2nd, 2015 📆 | 2510 Views ⚑

0

Applying Java’s Cryptography


iSpeech


Learn how to control Java’s cryptographic features to protect your application and any data that you manage. This session explains what different cryptography features do, what threats are addressed by each feature, and where the configuration takes place. Topics include certificates, code signatures, authenticating dynamic JVM languages, TLS control, perfect forward security, and transparent JPA encryption.

Author:
Erik Costlow
Erik Costlow is a product manager in Oracle's Java Platform Group and a regular contributor to the Java Platform Group PM blog. Erik also works closely with industry on Oracle's Java Root Certificate Program to ensure highest program quality. Previously Erik was employed at HP where he influenced design of the Fortify security analysis suite used by software developers across the world.
View more trainings by Erik Costlow at https://www.parleys.com/author/erik-costlow





Find more related tutorials at https://www.parleys.com/category/developer-training-tutorials


2015-06-02 14:07:52

source

Tagged with:



Comments are closed.