Java 2 network security

Xem 1-7 trên 7 kết quả Java 2 network security
  • The purpose of this book is to answer those questions, from the point of view of people who want to use Java, but want to do so reliably, securely and safely. That makes this book different from much recent writing on Java, which focuses, perfectly legitimately, on how a Java system can be broken into and how to avoid those dangers. On the contrary, this book focuses on how Java can be made secure and how to exploit its strengths. The goal is to provide practical help to the various groups involved in making a Java-based application or Web site into an industrial-strength commercial proposit.

    pdf702p bluesky_12 25-12-2012 35 12   Download

  • As the person who led the JavaSoft team that developed the Java security technology discussed in this book, it is extremely gratifying to see people spend their precious time writing about our technology and products. Every engineer’s dream is to have his or her technology deployed and used by thousands of others, and this book is a great help to Java developers who write security-aware applications.

    pdf50p tailieuvip14 26-07-2012 35 5   Download

  • The purpose of this chapter is not only to introduce the themes of the book to those who will later read the more detailed chapters that follow, but also to act as a brief overview for the intelligent non-specialist who does not need all the details. This is because the focus of the book is on helping people to deploy Java in a secure way. There are many people involved in that – managers, administrators, developers, systems programmers, users – all of whom play a part.

    pdf30p giangtanthon 10-02-2010 71 21   Download

  • Cryptography & Network Security: Exercise 2 - Nguyen Cao Dat goals is Learn about JCA (Java Cryptography Architecture), Understand the JCE (Java Cryptography Extension), How to use Java Crypto API’s, How to use Java BigInteger class.

    pdf24p cocacola_17 09-12-2015 7 1   Download

  • The class file verifier (which includes the bytecode verifier) checks that the program obeys the rules of the Java Virtual Machine (but note that this does not necessarily mean that it obeys the rules of the Java language). 3. The security manager imposes local restrictions on the things that the program is allowed to do. It is perfectly possible to customize this to allow code limited access to carefully controlled resources. This could mean allowing no access to the local file system, and network access only to the location from which the code, or its Web page, came. You...

    pdf20p giangtanthon 10-02-2010 83 23   Download

  • Tham khảo sách 'mcse, ccna, ccnp, ocp, ciw, java, sun solaris, checkpoint world no1 cert guides: composite exam exam 642-891 edition 2.0', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf196p duypha 10-08-2009 112 22   Download

  • One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is the in-depth exploration you need.

    pdf2891p truongnghen 21-01-2013 28 10   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản