Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java Security (Java Series)

Buy
Java Security (Java Series), 9781565924031 (1565924037), O'Reilly, 1998

Java's most striking claim is that it provides a secure programming environment. However, despite lots of discussion, few people understand precisely what Java's claims mean and how it backs up those claims. Java Security is an in-depth exploration aimed at developers, network administrators, and anyone who needs to work with or understand Java's security mechanisms. It discusses in detail what security does and doesn't mean, what Java's default security policies are, and how to create and implement your own policies.In doing so, Java Security provides detailed coverage of security managers, class loaders, the access controller, and much of the java.security package. It discusses message digests, certificates, and digital signatures, showing you how to use Java's facilities for signing classes or to implement your own signature facility. It shows you how to write a class loader that recognizes signed classes, verifies the signature, and cooperates with a security manager to grant additional privileges. It also discusses the problem of managing cryptographic keys and shows you how to implement your own key management systems.Java Security is an essential book for everyone using Java in real-world software. If you're deploying software written in Java, you need to know how to grant your classes the privileges they need, without granting privileges to untrusted classes. You need to know how to protect your systems against intrusion and corruption. Java provides the tools; this book shows you how to use them.

(HTML tags aren't allowed.)

Computation Engineering: Applied Automata Theory and Logic
Computation Engineering: Applied Automata Theory and Logic

The computer hardware and software industry is committed to using formal methods. As a result, it is crucial that students who take automata theory and logic courses retain what they have learned and understand how to use their knowledge. Yet many textbooks typically emphasize automata theory only, not logic, thus losing a valuable opportunity...

Blitzkrieg: From the Ground Up
Blitzkrieg: From the Ground Up

An examination of the German Blitzkrieg operations from Poland to Operation Barbarossa, as experienced by junior commanders and enlisted men, exploring why they were so successful.

The successes of the German Blitzkrieg in 1939–41 were as surprising as they were swift. Allied
...

Pro .NET 1.1 Remoting, Reflection, and Threading
Pro .NET 1.1 Remoting, Reflection, and Threading
When reading the title of this book, you might ask yourself “Why did they put remoting,
reflection, and threading together in one book?” The answer might not seem obvious at first,
but after reading this introduction you should understand why these three technologies belong
in a developer’s toolkit and in a
...

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

Introduction to Networking Basics
Introduction to Networking Basics
Today’s students have different goals, different life experiences, and different academic backgrounds, but they are all on the same path to success in the real world. This diversity, coupled with the reality that these learners often have jobs, families, and other commitments, requires a fl exibility that our...
Corporate Information Strategy and Management
Corporate Information Strategy and Management

"Corporate Information Strategy and Management: Text and Cases 8/e" by Applegate, Austin, and Soule is written for students and managers who desire an overview of contemporary information systems technology management. This new edition examines how information technology (IT) enables organizations to conduct business in radically...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy