MainComputersProgrammingLanguages › ONJava.com: Discovering a Java Application's Security Requirements

ONJava.com: Discovering a Java Application's Security Requirements

Edit Page
Report
Scan day: 16 February 2014 UTC
6
Virus safety - good
Description: Mark Petrovic shows how to use a development-time SecurityManager that logs applications' calls and builds a suitable Java security policy file. (January 03, 2007)
Discovering a Java Application's Security Requirements - O'Reilly Media Discovering a Java Application's Security Requirements Application security is not easy - we know that. But we also know there are steps we can take to mitigate the risk of security failures. If we are network engineers, we invest in knowledge of network partitioning and packet filters. If we program in C, we protect against buffer overflow. If we program in Java, we consider running our application under the protection of a
Size: 515 chars

Contact Information

Email:
Phone&Fax:
Address:
Extended:

WEBSITE Info

Page title:Discovering a Java Application's Security Requirements - O'Reilly Media
Keywords:java security policy,java.lang.SecurityManager,java.security.ProtectionDomain,java.lang.ref,O'Reilly Media
Description:
IP-address:87.245.200.73

WHOIS Info

NS
Name Server: NSAUTHA.OREILLY.COM
Name Server: NSAUTHB.OREILLY.COM
WHOIS
Status: clientDeleteProhibited
Status: clientRenewProhibited
Status: clientTransferProhibited
Status: clientUpdateProhibited
Date
Creation Date: 10-feb-2000
Expiration Date: 10-feb-2015