Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Cryptography for Visual Basic:
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Cryptography for Visual Basic:

Cryptography for Visual Basic:

A Programmer's Guide to the Microsoft CryptoAPI

Richard Bondi

416 pages, parution le 15/08/2000

Résumé

With billions of dollars at stake,e-businesses must take the necessary steps to ensure privacy and protection for customer data. Microsoft's CryptoAPI provides Visual Basic programmers with strong cryptography to keep this data safe, but its internals have been a mystery until now. This book guides you through the process of accessing the powerful but tricky routines of Microsoft's cryptographic libraries. You'll find an in-depth introduction to modern cryptography and learn how to build cryptographic "modules" (COM objects) that can be used by any Visual Basic program. Best of all, the source code is included under an Open Source license so that you are free to use, modify, and distribute it, even commercially, without paying any fees. You can help enhance the code as part of the Open Source community. Providing much-needed insight on Microsoft's cryptography, this book will help you:
  • Learn how modern cryptography works
  • Find out how the Base Functions of the CryptoAPI work
  • Discover how to call the API from Visual Basic
  • Uncover deep Visual Basic tricks to write a powerful error handler
  • Learn how to write the WCCO (Wiley CryptoAPI COM Objects) COM wrappers for the CryptoAPI
  • Utilize several quality assurance tests for the WCCO

The CD-ROM includes:

  • WCCO 1.0 Source Code and its Wiley Open Source License
  • WCCO 1.0 Interface Guide and its Open Publication License
  • WCCO Test Code
  • CryptoAPI Container Manager
  • Regasaurus program

Contents

  • Everything a VB Programmer Needs to Know about Cryptography
  • An Overview of the CryptoAPI
  • Calling the CryptoAPI from Visual Basic
  • Deep Visual Basic Tricks
  • An Object Model for the CryptoAPI
  • The Provider and the Container Objects
  • The Key Objects
  • Hashing and Signing with the WCCO Objects
  • Encryption and the Messagetext Object
  • Testing the Objects
  • Key Management and Data Security
  • Philosophy, Public Policy, the Law, and Cryptography
  • Appendices
  • Glossary
  • Bibliography
  • Open Source License

L'auteur - Richard Bondi

Richard Bondi is a senior developer at 3rd Millenium (www.3rdmill.com), a bioinformatics company. He has worked as a Web developer since 1996, moved into e-commerce and enterprise programming in 1998, and has consulted leading Internet companies on programming cryptography.

Caractéristiques techniques

  PAPIER
Éditeur(s) Wiley
Auteur(s) Richard Bondi
Parution 15/08/2000
Nb. de pages 416
Format 19 x 23,3
Couverture Broché
Poids 864g
Intérieur Noir et Blanc
EAN13 9780471381891

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav.client@eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription