Inside java™ 2 platform security: srchitecture, API design, and implementation- (E-BOOK) Li Gong and Garry Ellison

By: Gong, LiPublisher: New York The Sun 2002Edition: 2ndDescription: 262 pSubject(s): E-BOOKDDC classification: 005.133
Contents:
CHAPTER 1. COMPUTER AND NETWORK SECURITY FUNDAMENTALS(Page-9)CHAPTER 2. BASIC SECURITY FOR THE JAVA PROGRAMMING LANGUAGE(Page-25)CHAPTER 4. SECURE CLASS LOADING.(Page-37)CHAPTER 5. ELEMENTS OF SECURITY POLICY.(Page-49)CHAPTER 6. ENFORCING SECURITY POLICY(Page-72)CHAPTER 7. CUSTOMIZING THE SECURITY ARCHITECTURE (Page-92)CHAPTER 8. ESTABLISHING TRUST.(Page-102)CHAPTER 9. OBJECT SECURITY(Page-124)CHAPTER 10. PROGRAMMING CRYPTOGRAPHY(Page-139)CHAPTER 11. NETWORK SECURITY.(Page-189)CHAPTER 12. DEPLOYING THE SECURITY ARCHITECTURE.(Page-207)CHAPTER 13. OTHER PLATFORMS AND FUTURE DIRECTIONS(Page-242)
Tags from this library: No tags from this library for this title. Log in to add tags.

CHAPTER 1. COMPUTER AND NETWORK SECURITY FUNDAMENTALS(Page-9)CHAPTER 2. BASIC SECURITY FOR THE JAVA PROGRAMMING LANGUAGE(Page-25)CHAPTER 4. SECURE CLASS LOADING.(Page-37)CHAPTER 5. ELEMENTS OF SECURITY POLICY.(Page-49)CHAPTER 6. ENFORCING SECURITY POLICY(Page-72)CHAPTER 7. CUSTOMIZING THE SECURITY ARCHITECTURE (Page-92)CHAPTER 8. ESTABLISHING TRUST.(Page-102)CHAPTER 9. OBJECT SECURITY(Page-124)CHAPTER 10. PROGRAMMING CRYPTOGRAPHY(Page-139)CHAPTER 11. NETWORK SECURITY.(Page-189)CHAPTER 12. DEPLOYING THE SECURITY ARCHITECTURE.(Page-207)CHAPTER 13. OTHER PLATFORMS AND FUTURE DIRECTIONS(Page-242)

There are no comments on this title.

to post a comment.
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.