Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java Security (2nd Edition)

Buy
Java Security (2nd Edition), 9780596001575 (0596001576), O'Reilly, 2001
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is the in-depth exploration you need.

"Java Security," 2nd Edition, focuses on the basic platform features of Java that provide security--the class loader, the bytecode verifier, and the security manager--and recent additions to Java that enhance this security model: digital signatures, security providers, and the access controller. The book covers the security model of Java 2, Version 1.3, which is significantly different from that of Java 1.1. It has extensive coverage of the two new important security APIs: JAAS (Java Authentication and Authorization Service) and JSSE (Java Secure Sockets Extension). "Java Security," 2nd Edition, will give you a clear understanding of the architecture of Java's security model and how to use that model in both programming and administration.

The book is intended primarily for programmers who want to write secure Java applications. However, it is also an excellent resource for system and network administrators who are interested in Java security, particularly those who are interested in assessing the risk of using Java and need to understand how the security model works in order to assess whether or not Java meets their security needs.

Guide to writing and deploying secure applications with Java, offering those writing real-world software for the Internet and those deploying software written in Java. Shows how to grant the desired classes access to programs while shutting out unwanted other classes. Covers Java 1.1, 2, and 1.2.1. Softcover.

About the Author

Scott Oaks is a Java technologist at Sun Microsystems, where he has worked since 1987. While at Sun, he has specialized in many disparate technologies, from the SunOS kernel to network programming and RPCs. Since 1995 he has primarily focused on Java and

(HTML tags aren't allowed.)

Information Architecture for the World Wide Web
Information Architecture for the World Wide Web

The post-Ajaxian Web 2.0 world of wikis, folksonomies, and mashups makes well-planned information architecture even more essential. How do you present large volumes of information to people who need to find what they're looking for quickly? This classic primer shows information architects, designers, and web site developers how to build...

Hacking Firefox: More Than 150 Hacks, Mods, and Customizations
Hacking Firefox: More Than 150 Hacks, Mods, and Customizations
They dreamed of a better browser . . . and before you could say "explore no more," Firefox was born. But already you want more. Tighter security, greater functionality. A custom installation for Linux. Maybe even that unique extension you've always dreamed of creating. Well, if you want to tweak the Fox, here are over 400 pages of ways...
Practical JavaScript, DOM Scripting and Ajax Projects
Practical JavaScript, DOM Scripting and Ajax Projects
Practical JavaScript, DOM, and Ajax Projects is ideal for web developers already experienced in JavaScript who want to take their knowledge to the next level. It presents ten complete example projects for you to learn from and adapt for use in your own work.

The book starts with a quick recap of the fundamentals of modern JavaScript...


Minerals of the mercury ore deposit Idria
Minerals of the mercury ore deposit Idria

The present work is the first comprehensive study of mineralogy of the world's second largest mercury mine Idria. In the first chapter the readers are acquainted with the history of mining and its relation to mineralogy. Mineralogy is explained in terms of geological processes that were active during the formation of the ore deposit....

Within the Frame: The Journey of Photographic Vision
Within the Frame: The Journey of Photographic Vision

Within the Frame is a book about finding and expressing your photographic vision, specifically where people, places, and cultures are concerned. A personal book full of real-world wisdom and incredible images, author David duChemin (of pixelatedimage.com) shows you both the how and the why of finding, chasing, and expressing your...

Observing the User Experience: A Practitioner's Guide to User Research
Observing the User Experience: A Practitioner's Guide to User Research

The gap between who designers and developers imagine their users are, and who those users really are can be the biggest problem with product development. Observing the User Experience will help you bridge that gap to understand what your users want and need from your product, and whether they'll be able to use what you've created.

...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy