Secure XML

Secure XML
Author: Donald Eastlake
Publisher: Addison-Wesley Professional
Total Pages: 559
Release: 2002
Genre: Computers
ISBN: 0201756056


Download Secure XML Book in PDF, Epub and Kindle

This authoritative and comprehensive workbook covers XML encryption, confidentiality, authentication, digital signatures, message authentication, and cryptographic algorithms. This book will show developers all they need to know about how to use XML Digital Signatures to protect the integrity and authenticity of data, and how to use XML Encryption to control its confidentiality.


Secure XML
Language: en
Pages: 559
Authors: Donald Eastlake
Categories: Computers
Type: BOOK - Published: 2002 - Publisher: Addison-Wesley Professional

GET EBOOK

This authoritative and comprehensive workbook covers XML encryption, confidentiality, authentication, digital signatures, message authentication, and cryptograp
XML & Related Technologies:
Language: en
Pages: 527
Authors: Kahate, Atul
Categories: XML (Document markup language)
Type: BOOK - Published: 2009 - Publisher: Pearson Education India

GET EBOOK

XML has become the standard for all kinds of integration and deployment of applications, regardless of the technology platform. XML & Related Technologies cover
E-business
Language: en
Pages: 1164
Authors: Brian Stanford-Smith
Categories: Business & Economics
Type: BOOK - Published: 2000 - Publisher: IOS Press

GET EBOOK

How can the Internet and world wide web improve my long-term competitive advantage? This book helps answer this question by providing a better understanding of
Secure XML
Language: en
Pages: 532
Authors: Donald Eastlake
Categories: Computer networks
Type: BOOK - Published: 2002 - Publisher:

GET EBOOK

XML-Based Data Management and Multimedia Engineering - EDBT 2002 Workshops
Language: en
Pages: 664
Authors: Akmal B. Chaudhri
Categories: Computers
Type: BOOK - Published: 2002-11-19 - Publisher: Springer Science & Business Media

GET EBOOK

This volume comprises papers from the following three workshops that were part of the complete program for the International Conference on Extending Database Te