Java Security SolutionsYour complete guide to the what, why, where, and how of Java Security
In this unique guide, two Java security experts show you how to take full advantage of Java security technologies–cryptography, algorithms, and architecture. They explain today’s Java security tools, concepts, protocols, and specifications, including ECC, RSA,... | | A Guide to Claims-Based Identity and Access Control (Patterns & Practices)
Claims-based identity means to control the digital experience and to use digital resources based on things that are said by one party about another. A party can be a person, organization, government, Web site, Web service, or even a device. The very simplest example of a claim is something that a party says about itself.
As the... | | Solaris 9 Administration: A Beginner's GuideEssential Skills--Made Easy!
Learn to set up, run, and support Solaris 9 across your network using this hands-on introductory guide. Beginning with an overview of this powerful operating system, this practical resource will show you how to install the SPARC version of Solaris 9 and manage Internet and intranet services, and will help you become... |