YURTSEVEN.ORG is completely for sale, including entire Databases and Domainname. Price: USD 49.900,- Phone: +49(176)74919078
HOME
Programming
Languages
Java
Security
Sort by
Date
Alphabetical
Showing
1
-
10
of total
17
results
[ 0.099 seconds ]
1 -
Sun Microsystems - Tutorials on Security in Java 2 SDK
07-January-2012
Tutorials on Java 2 Security features, including access control, digital signatures, and cryptography.
[more pages from this URL]
2 -
Sun Microsystems - Security Programming Quiz
07-January-2012
This short quiz tests your knowledge of the Java 2 security features.
[more pages from this URL]
3 -
Sun Microsystems - JDBC Security Guidelines
07-January-2012
Guidelines on developing secure Java application using JDBC
[more pages from this URL]
4 -
Sun Microsystems - Java 2 Security Quiz
07-January-2012
Java 2 Security Quiz based on the book "Inside Java 2 Platform Security".
[more pages from this URL]
5 -
Simplify enterprise Java authentication with single sign-on
07-January-2012
Article examining how to implement Java Single Sign-On based architecture and functionality using the GSS-API and Kerberos tickets.
[more pages from this URL]
6 -
Secure your Java apps from end to end
07-January-2012
Javaworld article by Todd Sundsted that examines the foundation of Java security, including virtual machine and byte code security.
[more pages from this URL]
7 -
O'Reilly - Java And Security
07-January-2012
Article that examines various Java security services, including Java Security Manager, Security Provider Architecture, and Authentication components.
[more pages from this URL]
8 -
ONJava.com: Discovering a Java Application's Security Requirements
07-January-2012
Mark Petrovic shows how to use a development-time SecurityManager that logs applications' calls and builds a suitable Java security policy file.
[more pages from this URL]
9 -
KeyTool GUI
07-January-2012
A utility that is a GUI version of the keytool provided with the Java SDK. [GPL]
[more pages from this URL]
10 -
JChains Java Security Policy Generator
07-January-2012
Allows security auditors to record and optimize permissions needed by Java applications.
[more pages from this URL]
1
2
Next
»
Add URL
|
My Sites
|
My Account
|
Login
|
Contact Us