Monday, 24 January 2011

Part 2 of Security In bada Applications

Following on from Part One, Part Two of  Security in bada Applications looks at Digital Signatures and Hashes - Quite a challenging subject, we continue with the classic Alice & Bob scenario, with Eve still running the interference (why can't she just let them live in peace?!). Check out the video after the jump or click here to view it on You Tube. Also worth mentioning is that we are going to make the source code available for the test project used in the video - under a new section of the developer site potentially called "Samples" (Watch this space!)

Thanks for the feedback about the level of detail - we aim to make our videos as useful as possible to help you with your development project. If you have any specific topic ideas, why not get in touch?

No comments:

Post a Comment

Please don't post spam. Its tiresome.

Note: only a member of this blog may post a comment.