Java network security
This book gives managers and administrators the tools they need to build highly-secure, easy-to-administer Java applications and applets. Learn about Java's built-in security capabilities and how you can make the most of them. Discover how to evaluate the security risks associated with using Java in various environments; understand the known loopholes in Java security; and discover techniques and fixes to avoid those security risks. Learn how to establish standards for systems management in Java applications, and how to instrument a Java-based application for control and performance measurement. This is essential reading for all IS managers, administrators, system analysts and consultants who want to build secure, manageable Java applications.
What people are saying - Write a review
We haven't found any reviews in the usual places.
An Overview of Java Security
Attack and Defense
The Java Virtual Machine
11 other sections not shown
algorithm allow applet class loader application architecture attack authentication browser bytecode verifier bytes Chapter class file verifier class loader ClassLoader client compiler configuration connection constant pool contains create Cryptography Cryptolope object decompiler Destination port digital signatures environment example executable content Figure firewall function gateway header implementation installed instruction interface JAR files Java applet Java bytecode Java class file Java code Java security Java virtual machine JavaSoft key database key pair language lnternet lP address machine code Microsoft Netscape operating system package packet perform PointlessButton primordial class loader protocol proxy server public key certificate public void request runtime sandbox restrictions script security manager SecurityManager signed applets signed JAR signer SOCKS server specific stack String TCP/lP trusted classes value of type Web browser web of trust Web server