Java Network SecurityThis book gives managers and administrators the tools they need to build highly-secure, easy-to-administer Java applications and applets. Learn about Java's built-in security capabilities and how you can make the most of them. Discover how to evaluate the security risks associated with using Java in various environments; understand the known loopholes in Java security; and discover techniques and fixes to avoid those security risks. Learn how to establish standards for systems management in Java applications, and how to instrument a Java-based application for control and performance measurement. This is essential reading for all IS managers, administrators, system analysts and consultants who want to build secure, manageable Java applications. |
Contents
An Overview of Java Security | 3 |
Attack and Defense | 15 |
The Java Virtual Machine | 47 |
Copyright | |
9 other sections not shown
Common terms and phrases
algorithm allow applet class loader application architecture attack authentication browser bytecode programs bytecode verifier bytes Certificate Authority Chapter class file verifier class loader ClassLoader client compiler configuration connection constant pool contains create Cryptography Cryptolope object D:\work\sun_signed_jar>javakey decompiler Destination port digital signatures environment example executable content Figure firewall function gateway header implementation installed instruction interface Internet invoked IP address JAR files Java applet Java bytecode Java code Java security Java Virtual Machine key database key pair language machine code Microsoft Netscape operating system package packet perform PointlessButton primordial class loader privileges protocol proxy server public key certificate public void request Robusta runtime sandbox restrictions script security manager SecurityManager signed applets signed JAR signer SOCKS server specific stack String TCP/IP trusted classes value of type Web browser Web server