Sold Out
Book Categories |
Preface | ||
Pt. I | Introduction | 1 |
1 | XML and Security | 3 |
2 | Digital Cryptography Basics | 13 |
Pt. II | XML Basics | 33 |
3 | The Extensible Markup Language | 35 |
4 | XML Document Type Definitions | 69 |
5 | XML Schema | 87 |
6 | XPath: A Basic Building Block | 99 |
7 | URIs, xml:base, and XPointer | 123 |
8 | SOAP | 145 |
Pt. III | Canonicalization and Authentication | 167 |
9 | XML Canonicalization: The Key to Robustness | 169 |
10 | XML Signatures and Authentication | 207 |
11 | Profiling XMLDSIG for Applications | 253 |
12 | ETSI "Advanced" XML Signatures | 263 |
Pt. IV | Keying | 293 |
13 | The KeyInfo Element | 295 |
14 | XKMS: XML Key Management | 319 |
Pt. V | Encryption | 341 |
15 | XML Encryption | 343 |
16 | Combining Encryption and Signature | 371 |
Pt. VI | Algorithms | 381 |
17 | Overview of Algorithms | 383 |
18 | Cryptographic Algorithms | 395 |
19 | Non-cryptographic Algorithms | 421 |
Appendixes | 435 | |
App. A | XML Security Implementations | 437 |
App. B | The W3C and W3C Documents | 453 |
App. C | The IETF and IETF Documents | 459 |
App. D | The NIST and NIST Documents | 465 |
App. E | The Paper and Protocol Points of View | 469 |
App. F | SOAP Encoding Schema | 481 |
References and Acronyms | 495 | |
Index | 507 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionSecure XML
X
This Item is in Your InventorySecure XML
X
You must be logged in to review the productsX
X
X
Add Secure XML, For many developers, Extensible Markup Language (XML) is the environment of choice for creating today's technologically sophisticated and security-sensitive Web applications. This hands-on guide combines a strong foundation in XML with proven, practical t, Secure XML to the inventory that you are selling on WonderClubX
X
Add Secure XML, For many developers, Extensible Markup Language (XML) is the environment of choice for creating today's technologically sophisticated and security-sensitive Web applications. This hands-on guide combines a strong foundation in XML with proven, practical t, Secure XML to your collection on WonderClub |