Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
XML Security

Buy
XML Security, 9780072193992 (0072193999), McGraw-Hill, 2002

Keep XML applications and documents secure with help from the leading authority in e-security

Get up to speed on XML and applied security technologies using this authoritative guide. Covering the fundamentals of XML structures and related security technologies--including XML signatures, XML encryption, and the XML key management specification--this resource contains both the conceptual information and the practical techniques you need to successfully work with this data-structuring language. You'll learn how to implement RSA Security's product CertJ--which secures Java- and XML-based applications--and get advice for preventing against denial of service attacks and other security violations. Written by a member of RSA Security's developer support team, this definitive book gives you all the knowledge you need to keep XML-based programs and documents digitally secure.

  • Learn to implement a solid XML security system using the latest technologies
  • Use the book as both a security and XML primer
  • Review schemas, DTDs, Xpointers, XSLT, namespaces, and more
  • Learn about the various signature types--such as enveloped, enveloping, and detached
  • Understand the structure, syntax, and processing rules of XML signature types
  • Examine the need for an XML key management system (XKMS)
  • Counteract specific security breaches--including denial of service and replay attacks
  • Find out about recent W3C XML security standards
  • Implement CERTJ--RSA's product which ensures security for Java and XML-based programs
  • See how data privacy can be applied to XML structures via encryption

Protect your XML-based programs and improve security with the most authoritative guide to XML security available.

For more information on RSA Press titles, please visit www.rsapress.com

About the Author

Blake Dournaee joined RSA Security's developer support team in 1999, specializing in support and training for the BSAFE line of cryptographic toolkits. As part of current duties at RSA he is part of the CERTJ development team, which enables Java and XML programs to be digitally secure.
(HTML tags aren't allowed.)

Absolute Beginner's Guide to Corel WordPerfect 10
Absolute Beginner's Guide to Corel WordPerfect 10
In recent news, Corel announced that HP, the world's largest PC manufacturer, Dell, the second-largest, and Sony have all agreed to preinstall WordPerfect 10 and Quattro Pro 10 on some of their computer lines. Cost differential between Microsoft's Office and Works Suites, as well as Microsoft's Office licensing terms is helping fuel the trend to...
Data Dissemination and Query in Mobile Social Networks (SpringerBriefs in Computer Science)
Data Dissemination and Query in Mobile Social Networks (SpringerBriefs in Computer Science)

With the increasing popularization of personal hand-held mobile devices, more people use them to establish network connectivity and to query and share data among themselves in the absence of network infrastructure, creating mobile social networks (MSNet). Since users are only intermittently connected to MSNets, user mobility should be...

Development of Aneurysms (Nature Conservancy Book)
Development of Aneurysms (Nature Conservancy Book)

The focus of the book, Development of Aneurysms, is a detailed discussion of the biology of aneurysms. Aneurysm formation is influenced by alterations in arterial wall protein synthesis, hemodynamic forces, arterial wall inflammation, and matrix protein degradation. The relationships of these forces provide a unified theory for the...


Business Travel and Tourism
Business Travel and Tourism
This is a book which is nothing if not ambitious.

First, it attempts to offer a comprehensive overview of the diverse and fragmented world of business travel and tourism. It endeavours to do this at a time when there is still relatively little literature on any aspect of this subject. However, the authors believe that there is a need for
...
The Effects of Estrogen on Brain Function
The Effects of Estrogen on Brain Function

This timely volume reviews current data on the effects of estrogen on the central nervous system, highlighting clinical aspects of this topic. Experts from the fields of psychiatry, pharmacology, neurology, and geriatrics collaborate to clarify the known risks and benefits of hormone therapy and explore questions that remain to be...

Theoretical Computer Sciences: Lectures given at a Summer School of the Centro Internazionale Matematico Estivo
Theoretical Computer Sciences: Lectures given at a Summer School of the Centro Internazionale Matematico Estivo

R.E. Miller: Parallel program schemata.- D.E. Muller: Theory of automata.- R. Karp: Computational complexity of combinatorial and graph-theoretic problems.

In this lecture we discuss a type of computer organization which is based upon the concept of operation sequencing being controlled by operand availability. Such sequencing...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy