Java 2 network security

Xem 1-7 trên 7 kết quả Java 2 network security
  • Network security Java 2 provide some necessary content to help you have more materials for reference as well as practice knowledge. Hope the document gives you good lessons for you to study.

    pdf702p bluesky_12 25-12-2012 54 14   Download

  • As the person who led the JavaSoft team that developed the Java security technology discussed in this book, it is extremely gratifying to see people spend their precious time writing about our technology and products. Every engineer’s dream is to have his or her technology deployed and used by thousands of others, and this book is a great help to Java developers who write security-aware applications.

    pdf50p tailieuvip14 26-07-2012 44 5   Download

  • The purpose of this chapter is not only to introduce the themes of the book to those who will later read the more detailed chapters that follow, but also to act as a brief overview for the intelligent non-specialist who does not need all the details. This is because the focus of the book is on helping people to deploy Java in a secure way. There are many people involved in that – managers, administrators, developers, systems programmers, users – all of whom play a part.

    pdf30p giangtanthon 10-02-2010 93 21   Download

  • Cryptography & Network Security: Exercise 2 - Nguyen Cao Dat goals is Learn about JCA (Java Cryptography Architecture), Understand the JCE (Java Cryptography Extension), How to use Java Crypto API’s, How to use Java BigInteger class.

    pdf24p cocacola_17 09-12-2015 20 1   Download

  • The class file verifier (which includes the bytecode verifier) checks that the program obeys the rules of the Java Virtual Machine (but note that this does not necessarily mean that it obeys the rules of the Java language). 3. The security manager imposes local restrictions on the things that the program is allowed to do. It is perfectly possible to customize this to allow code limited access to carefully controlled resources. This could mean allowing no access to the local file system, and network access only to the location from which the code, or its Web page, came. You...

    pdf20p giangtanthon 10-02-2010 102 23   Download

  • Tham khảo sách 'mcse, ccna, ccnp, ocp, ciw, java, sun solaris, checkpoint world no1 cert guides: composite exam exam 642-891 edition 2.0', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf196p duypha 10-08-2009 124 22   Download

  • One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is the in-depth exploration you need.

    pdf2891p truongnghen 21-01-2013 50 13   Download


p_strKeyword=Java 2 network security

nocache searchPhinxDoc


Đồng bộ tài khoản