Blog: geekAbyte


238 blogs updated: 87 min. ago
IntoIterator and the for ... in Syntax in Rust
In Rust Iterator pattern with iter(), into_iter() and iter_mut() methods I explained why attempting to use a variable holding a Vec after it...
4
13-08-2022 20:28:32 geekAbyte Advanced
Rust Iterator pattern with iter(), into_iter() and iter_mut() methods
Let's create a vec of integers, iterate through and print the individual values, and then afterward, print out the whole vec. Here is the co...
6
11-08-2022 01:38:20 geekAbyte Advanced
Introduction to Digital Signature for the Working Developer
In this post, we would be looking at digital signatures. It will be a quick, straight-to-the-point overview of some of the essential things ...
14
12-06-2022 16:53:07 geekAbyte Advanced
Introduction to Asymmetric Encryption for the Working Developer
In this post, we are going to look at asymmetric encryption. As mentioned in the previous post on symmetric encryption, encryption is the cr...
13
06-06-2022 14:52:06 geekAbyte Advanced
A Neophyte's Introduction to the async/await landscape in Rust
The async/await features in other programming languages seem to be more straightforward. For example in JavaScript, you have the syntax that...
12
30-05-2022 00:44:26 geekAbyte Advanced
Introduction to Key Exchange for the Working Developer
In Introduction to Symmetric Encryption for the Working Developer, we saw how to encrypt and decrypt data. Being symmetric encryption, both ...
3
07-05-2022 23:45:13 geekAbyte Advanced
Introduction to Authenticated Encryption for the Working Developer
In Introduction to Symmetric Encryption for the Working Developer, I presented an overview of symmetric encryption. Which as explained in th...
9
05-05-2022 18:23:58 geekAbyte Advanced
Introduction to Symmetric Encryption for the Working Developer
Encryption is all about establishing confidentiality. That is, making sure only authorised parties have access to specific data. It involves...
7
01-05-2022 20:30:16 geekAbyte Advanced
Hash Function in Action: Message Authentication Codes
In Introduction to Cryptographic Hash Functions for the Working Developer, I presented a straight to the point, overview of some essential t...
0
23-10-2021 18:50:13 geekAbyte Advanced
Introduction to Cryptographic Hash Functions for the Working Developer
Much more than encryption algorithms, one-way hash functions are the workhouses of modern cryptography - Bruce schneierThis post would be a ...
0
20-10-2021 21:40:38 geekAbyte Advanced


© Jiri Pinkas | this project on GitHub | related: JavaVids | Maven Central Repository Search | Java školení

Top Java Blogs is a Java blog aggregator (with English-written blogs only) focused on Java SE, Java EE, Spring Framework and Hibernate.

Made better & faster using https://www.yourkit.com/ Java Profiler