Xem 1-20 trên 77 kết quả The java.security
  • When I first mentioned to a colleague of mine that I was writing a book on JavaTM security, he immediately starting asking me questions about firewalls and Internet DMZs. Another colleague overheard us and started asking about electronic commerce, which piqued the interest of a third colleague who wanted to hear all about virtual private networks. All this was interesting, but what I really wanted to talk about was how a Java applet could be allowed to read a file.

    pdf486p nguyen3 12-11-2009 132 60   Download

  • Starting with expert guidance on web tier technologies, including JavaServer Faces and Facelets, this book also covers building web services using JAX-WS and JAX-RS, developing business logic with Enterprise JavaBeans components, accessing databases using the Java Persistence API, securing web and enterprise applications, and using Contexts and Dependency Injection for the Java EE platform.

    pdf588p phungnguyet_123 20-02-2013 28 9   Download

  • As the person who led the JavaSoft team that developed the Java security technology discussed in this book, it is extremely gratifying to see people spend their precious time writing about our technology and products. Every engineer’s dream is to have his or her technology deployed and used by thousands of others, and this book is a great help to Java developers who write security-aware applications.

    pdf50p tailieuvip14 26-07-2012 35 5   Download

  • This book is a desktop quick reference for the Java 2 Micro Edition (J2ME ). It is intended for Java programmers writing applications for devices with limited memory resources and processor power, such as cell...

    pdf486p stumble 25-05-2009 260 107   Download

  • The Java™ Web Services Tutorial For Java Web Services Developer’s Pack, v1.6 June 14, 2005 .Copyright © 2005 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A. All rights reserved.U.S. Government Rights - Commercial software. Government users are subject to the Sun Microsystems, Inc. standard license agreement and applicable provisions of the FAR and its supplements. This distribution may include materials developed by third parties.

    pdf457p ptng13 16-05-2012 86 47   Download

  • Java Network Programming, 3rd Edition includes chapters on TCP and UDP sockets, multicasting protocol and content handlers, servlets, multithreaded network programming, I/O, HTML parsing and display, the Java Mail API, and the Java Secure Sockets Extension. There's also significant information on the New I/O API that was developed in large part because of the needs of network programmers.

    pdf3596p truongnghen 21-01-2013 51 25   Download

  • This book got its start as an experiment in modern technology. When I started teaching at my present university (1998), the organization and architecture course focused on the 8088 running MS-DOS—essentially a programming environment as old as the sophomores taking the class. (This temporal freezing is unfortunately fairly common; when I took the same class during my undergraduate days, the computer whose architecture I studied was only two years younger than I was.

    pdf334p hotmoingay3 09-01-2013 22 3   Download

  • Every day I read e-mails and articles dealing with computer security attacks and breaches, and the repercussions that follow. I have been getting onboard with computer security for decades, and there is no end in sight for this effort. Each and every professional in information technology has a commitment to keep with regard to computer security. We have, most of us, signed computing codes of conduct, and further we have aligned ourselves with those who protect the computing resources of our respective companies....

    pdf466p bachduong1311 12-12-2012 30 2   Download

  • Sun Microsystems, Inc. has intellectual property rights relating to technology embodied in the product that is described in this document. In particular, and without limitation, these intellectual property rights may include one or more U.S. patents or pending patent applications in the U.S. and in other countries. U.S. Government Rights – Commercial software. Government users are subject to the Sun Microsystems, Inc. standard license agreement and applicable provisions of the FAR and its supplements. This distribution may include materials developed by third parties.

    pdf1124p nuoiheocuoivo 09-05-2010 148 49   Download

  • THE Java™ Web Services Tutorial is a guide to developing Web applications with the Java Web Services Developer Pack (Java WSDP). The Java WSDP is an all-in-one download containing key technologies to simplify building of Web services using the Java 2 Platform. This tutorial requires a full installation (Typical, not Custom) of the Java WSDP, v1.6 with the Sun Java System Application Server Platform Edition 8.1 2005Q2 UR2 (hereafter called the Application Server). Here we cover all the things you need to know to make the best use of this tutorial....

    pdf463p ptng13 16-05-2012 66 24   Download

  • Portal development projects have become the centerpiece of IT acquisition and development strategy for many organizations. Enterprise integration and Web application developers predictably groan when they hear the word “portal”—nightmares of proprietary APIs, oversold features, and shoddy tool integrations. The authors of this book have been involved in over a dozen production portal efforts over the last several years. In that time, we have dealt with numerous products and frameworks, including some in-house frameworks based on servlets and JSPs.

    pdf459p tailieuvip13 19-07-2012 54 16   Download

  • The purpose of this book is to answer those questions, from the point of view of people who want to use Java, but want to do so reliably, securely and safely. That makes this book different from much recent writing on Java, which focuses, perfectly legitimately, on how a Java system can be broken into and how to avoid those dangers. On the contrary, this book focuses on how Java can be made secure and how to exploit its strengths. The goal is to provide practical help to the various groups involved in making a Java-based application or Web site into an industrial-strength commercial proposit.

    pdf702p bluesky_12 25-12-2012 33 12   Download

  • One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is the in-depth exploration you need.

    pdf2891p truongnghen 21-01-2013 27 10   Download

  • Mục tiêu bài học: Cuối chương này bạn có thể: Mô tả về công cụ JAR Tạo và xem một file JAR, liệt kê và trích rút nội dung của nó. Sử dụng chữ ký điện tử (Digital Signatures) để nhận dạng Applets Tạo bộ công cụ khóa bảo mật (Security key) Làm việc với chứng chỉ số (Digital Certificate) Tìm hiểu về gói Java.security

    pdf11p kennguyen3 23-10-2011 33 9   Download

  • So you like living on the bleeding edge and want to learn about Java 6, aka Mustang. Welcome. What you hold in your hands is a look at the newest features of the early access version of Mustang. Working through the early access releases from Sun, I’ve painfully struggled through the weekly drops and demonstrated the latest feature set to help you decide when or if it is time to move to Java 6. OK, maybe it wasn’t that painful. In any case, many of these new features make the transition from Java 5 (or earlier) to Java 6 the obvious choice....

    pdf239p tailieuvip13 20-07-2012 32 5   Download

  • Java Platform, Enterprise Edition is a widely used platform for enterprise server programming in the Java programming language. This book covers exciting recipes on securing, tuning, and extending Enterprise Applications using a Java EE 6 implementation. The book starts with the essential changes in Java EE 6. Then we will dive into the implementation of some of the new features of the JPA 2.0 specification, and look at implementing auditing for relational data stores.

    pdf60p namde04 04-05-2013 24 5   Download

  • Java Web Services shows you how to use SOAP to perform remote method calls and message passing; how to use WSDL to describe the interface to a web service or understand the interface of someone else's service; and how to use UDDI to advertise (publish) and look up services in each local or global registry. Java Web Services also discusses security issues, interoperability issues, integration with other Java enterprise technologies like EJB; the work being done on the JAXM and JAX-RPC packages, and integration with Microsoft's .NET services....

    pdf249p leethong 22-09-2010 299 141   Download

  • Master SAP NetWeaver Portal with the most comprehensive, step-by-step reference available on the entire portal implementation life cycle. Written by SAP architect Rabi Jay, this book provides everything you need to plan, design, install, configure, and administer SAP NetWeaver Portal, including SAP NetWeaver Application Server Java.

    pdf770p batoan 04-08-2009 188 124   Download

  • Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with

    pdf254p trung254 01-04-2012 75 30   Download

  • The class file verifier (which includes the bytecode verifier) checks that the program obeys the rules of the Java Virtual Machine (but note that this does not necessarily mean that it obeys the rules of the Java language). 3. The security manager imposes local restrictions on the things that the program is allowed to do. It is perfectly possible to customize this to allow code limited access to carefully controlled resources. This could mean allowing no access to the local file system, and network access only to the location from which the code, or its Web page, came. You...

    pdf20p giangtanthon 10-02-2010 83 23   Download

Đồng bộ tài khoản