Understanding and Leveraging Code Signing Technologies

Sponsored by Thawte Consulting

Jan De Clercq

March 1, 2006

2 Min Read
ITPro Today logo in a gray background | ITPro Today

This eBook discusses code signing technology. It explains the goals and benefits of code signing, how code signing works and the underlying cryptographic and security concepts and building blocks. The eBook also tells how to use code signing in practice. It includes practical examples and step-by-step guidance for the following code signing environments: Microsoft Authenticode and Office macro signing, Netscape and Java code signing.

"Understanding and Leveraging Code Signing Technologies" discusses code signing technology. The eBook explains the goals and benefits of code signing, how code signing works, and the underlying cryptographic and security concepts and building blocks. The eBook also tells how to use code signing in practice, and includes practical examples and step-by-step guidance for the following code signing technologies: Microsoft Authenticode and Office macro signing, Netscape, and Java code signing.

 

The book's primary audience is technical planners, architects, and consultants. IT and security planners and decision managers can certainly get value out of the introductory chapter.

 

"Understanding and Leveraging Code Signing Technologies" is made up of the following three chapters:

 

Chapter 1: Introduction to Code Signing
Chapter 1 provides a general introduction to code signing. This chapter explains the code signing goals (integrity and authenticity protection) and advantages of using code signing technology for the software developer. The introductory chapter also explains the code signing cryptographic building blocks (digital signature and certificates) and the underlying security infrastructure (certification authorities, public key infrastructure). Finally, the chapter introduces and explains the process of signing and verifying code.

 

Chapter 2: Leveraging Microsoft Code Signing Technologies
The second chapter focuses on Microsoft code signing technologies. This chapter explains Authenticode-based code signing and Microsoft Office macro signing. For both technologies the chapter runs through the processes of signing and verifying code.

 

Chapter 3: Leveraging Netscape and Java Code Signing Technologies
Chapter 3 focuses on Explains Netscape object signing and Java code signing technologies. This chapter explains both technologies and runs through the processes of signing and verifying code using the Netscape and Java code signing technologies.

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like