Skip to main content

Security and Cryptography

  • Chapter
  • 137 Accesses

Abstract

Writing secure code is hard. Even in traditional client-server applications, it’s difficult to defend against the vast array of possible threats and attacks. Security considerations stretch across every area of programming, from design to deployment, and include everything from hiding sensitive information to restricting the abilities of different classes of users. Code that runs smoothly, requires user credentials, and uses encryption can still be filled with exploitable security holes. Most often, the professional developers who created it won’t have any idea of the risk until these weaknesses are exploited.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Matthew MacDonald

About this chapter

Cite this chapter

Macdonald, M. (2003). Security and Cryptography. In: Peer-to-Peer with VB .NET. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-0817-4_11

Download citation

  • DOI: https://doi.org/10.1007/978-1-4302-0817-4_11

  • Publisher Name: Apress, Berkeley, CA

  • Print ISBN: 978-1-59059-105-5

  • Online ISBN: 978-1-4302-0817-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics