Inside java™ 2 platform security: srchitecture, API design, and implementation- (E-BOOK) Li Gong and Garry Ellison

By: Gong, LiPublisher: New York The Sun 2002Edition: 2ndDescription: 262 pSubject(s): E-BOOKDDC classification: 005.133
Contents:
CHAPTER 1. COMPUTER AND NETWORK SECURITY FUNDAMENTALS(Page-9)CHAPTER 2. BASIC SECURITY FOR THE JAVA PROGRAMMING LANGUAGE(Page-25)CHAPTER 4. SECURE CLASS LOADING.(Page-37)CHAPTER 5. ELEMENTS OF SECURITY POLICY.(Page-49)CHAPTER 6. ENFORCING SECURITY POLICY(Page-72)CHAPTER 7. CUSTOMIZING THE SECURITY ARCHITECTURE (Page-92)CHAPTER 8. ESTABLISHING TRUST.(Page-102)CHAPTER 9. OBJECT SECURITY(Page-124)CHAPTER 10. PROGRAMMING CRYPTOGRAPHY(Page-139)CHAPTER 11. NETWORK SECURITY.(Page-189)CHAPTER 12. DEPLOYING THE SECURITY ARCHITECTURE.(Page-207)CHAPTER 13. OTHER PLATFORMS AND FUTURE DIRECTIONS(Page-242)
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Collection Call number URL Status Date due Barcode Item holds
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
NFIC 005.133 GON (Browse shelf) Link to resource Available MCSEB-1192
Total holds: 0

CHAPTER 1. COMPUTER AND NETWORK SECURITY FUNDAMENTALS(Page-9)CHAPTER 2. BASIC SECURITY FOR THE JAVA PROGRAMMING LANGUAGE(Page-25)CHAPTER 4. SECURE CLASS LOADING.(Page-37)CHAPTER 5. ELEMENTS OF SECURITY POLICY.(Page-49)CHAPTER 6. ENFORCING SECURITY POLICY(Page-72)CHAPTER 7. CUSTOMIZING THE SECURITY ARCHITECTURE (Page-92)CHAPTER 8. ESTABLISHING TRUST.(Page-102)CHAPTER 9. OBJECT SECURITY(Page-124)CHAPTER 10. PROGRAMMING CRYPTOGRAPHY(Page-139)CHAPTER 11. NETWORK SECURITY.(Page-189)CHAPTER 12. DEPLOYING THE SECURITY ARCHITECTURE.(Page-207)CHAPTER 13. OTHER PLATFORMS AND FUTURE DIRECTIONS(Page-242)

There are no comments on this title.

to post a comment.
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.