My Account

Subcategories 3

Related categories 2

News, software, documentation, specifications, FAQs about Java security, by Sun.
Java security practice tests and quizzes for Java, EJB, and Web security.
Paper published in 1998 by Drew Dean, Edward Felten, Dan Wallach, and Dirk Balfanz. [Postscript format].
Allows security auditors to record and optimize permissions needed by Java applications.
Tutorials on Java 2 Security features, including access control, digital signatures, and cryptography.
Mark Petrovic shows how to use a development-time SecurityManager that logs applications' calls and builds a suitable Java security policy file. (January 03, 2007)
Article examining how to implement Java Single Sign-On based architecture and functionality using the GSS-API and Kerberos tickets. (September 09, 2003)
Javaworld article by Todd Sundsted that explains how to use JSSE and SSL for securing communication channels between Java applications. (May 11, 2001)
News, software, documentation, specifications, FAQs about Java security, by Sun.
Paper published in 1998 by Drew Dean, Edward Felten, Dan Wallach, and Dirk Balfanz. [Postscript format].
Java security practice tests and quizzes for Java, EJB, and Web security.
Tutorials on Java 2 Security features, including access control, digital signatures, and cryptography.
Allows security auditors to record and optimize permissions needed by Java applications.
Mark Petrovic shows how to use a development-time SecurityManager that logs applications' calls and builds a suitable Java security policy file. (January 03, 2007)
Article examining how to implement Java Single Sign-On based architecture and functionality using the GSS-API and Kerberos tickets. (September 09, 2003)
Javaworld article by Todd Sundsted that explains how to use JSSE and SSL for securing communication channels between Java applications. (May 11, 2001)
Last update:
August 31, 2020 at 5:25:08 UTC
Computers
Games
Health
Home
News