Quantcast
Channel: Secure Software Development » cryptography
Browsing all 4 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Book Review: The Security Development Lifecycle (SDL)

In The Security Development Lifecycle (SDL), A Process for Developing Demonstrably More Secure Software, authors Michael Howard and Steven Lipner explain how to build secure software through a...

View Article



Image may be NSFW.
Clik here to view.

Software Development and Lifelong Learning

The main constraint in software development is learning. This means that learning is a core skill for developers and we should not think we’re done learning after graduation. This post explores some...

View Article

Image may be NSFW.
Clik here to view.

Signing Java Code

In a previous post, we discussed how to secure mobile code. One of the measures mentioned was signing code. This post explores how that works for Java programs. Digital Signatures The basis for digital...

View Article

Image may be NSFW.
Clik here to view.

Using Cryptography in Java Applications

This post describes how to use the Java Cryptography Architecture (JCA) that allows you to use cryptographic services in your applications. Java Cryptography Architecture Services The JCA provides a...

View Article
Browsing all 4 articles
Browse latest View live




Latest Images