ONJava.com: Discovering a Java Application's Security Requirements
Edit Page
Report
Scan day: 16 February 2014 UTC
6
Virus safety - good
Description: Mark Petrovic shows how to use a development-time SecurityManager that logs applications' calls and builds a suitable Java security policy file.
(January 03, 2007)
Discovering a Java Application's Security Requirements - O'Reilly Media Discovering a Java Application's Security Requirements Application security is not easy - we know that. But we also know there are steps we can take to mitigate the risk of security failures. If we are network engineers, we invest in knowledge of network partitioning and packet filters. If we program in C, we protect against buffer overflow. If we program in Java, we consider running our application under the protection of a
Size: 515 chars
Contact Information
Email: —
Phone&Fax: —
Address: —
Extended: —
WEBSITE Info
Page title: | Discovering a Java Application's Security Requirements - O'Reilly Media |
Keywords: | java security policy,java.lang.SecurityManager,java.security.ProtectionDomain,java.lang.ref,O'Reilly Media |
Description: | |
IP-address: | 87.245.200.73 |
WHOIS Info
NS | Name Server: NSAUTHA.OREILLY.COM Name Server: NSAUTHB.OREILLY.COM |
WHOIS | Status: clientDeleteProhibited Status: clientRenewProhibited Status: clientTransferProhibited Status: clientUpdateProhibited |
Date | Creation Date: 10-feb-2000 Expiration Date: 10-feb-2015 |