Tags
Language
Tags
August 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 31 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31 1 2 3 4 5 6
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition) by Li Gong

    Posted By: Alexpal

    Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition) by Li Gong, Gary Ellison, Mary Dageforde
    Publisher: Addison-Wesley Professional; 2 edition (May 27, 2003) | ISBN: 0201787911 | CHM | 1,2 Mb | 384 pages

    An expert tour of security on the new Java 2 platform, Inside Java 2 Security will find an enthusiastic audience among advanced Java developers and system administrators. As the author notes during the general discussion on network security, safeguarding your system goes far beyond mere cryptography.
    This book reviews multiple security threats and the strategies used to combat them, such as denial of service attacks, Trojan horses, and covert channels. In addition, it touches on the evolution of Java security from the restrictive days of the JDK 1.0 sandbox to the sophisticated security features available in Java 2, including a section that presents a list of 11 security bugs found in early versions of Java.
    Because Java 2 security is now policy-based, it must be managed by system administrators as part of enterprise security. A chapter on Java 2 security presents the "big picture" as well as the classes used to implement policy-based security where developers can control access to an entire system like files, network resources, or runtime permissions on code. The book also discusses the rather primitive tools used for Java 2 security management such as the policytool utility. For advanced developers, further sections demonstrate how to create new permission classes and how to make JDK 1.1 security code migrate to Java 2.
    A section on the Java Cryptography Architecture (JCA) shows that Java 2 supports the latest in encryption standards like SHA, DSA, RSA, and X.509 certificates. The text concludes with some well-considered predictions for the future of security on the Java platform. In the meantime, this book shows you what you will need to know about security when committing to Java 2 on the enterprise. Security is now part of the picture and will require both extra development time and administrative effort. –Richard Dragan


    DOWNLOAD from RAPIDSHARE

    or mirror:
    DOWNLOAD from DEPOSITFILES



    ––––––––––––––––––––––––––––––––––––––––––-
    Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition) by  Li Gong
    My eBooks links (5600+) - links and descriptions
    version 11 (Nov 07 2006) [1,5 Mb] | Format: txt
    Download eBooks list from: Rapidshare or Depositfiles or Oxyshare

    My other (NON eBooks) links:
    (for the different reasons much from these folders was not published on AvaxHome)
    Folder N1 [.de] (FULL. 500 items). Welcome to F1 ->
    Folder N2 [.de] (additions!). Welcome to F2 ->
    Folder N3 [.com] (NEW! Daily additions! Recommended.). Welcome to F3 ->
    Password to folders: www.AvaxHome.ru