1 / 262
文档名称:

Sun Java Series - Inside Java 2 Platform Security - Architecture, API Design, and Implementation, 2nd Ed (covers JAAS) - 2003 - (By Laxxuss).pdf

格式:pdf   页数:262
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

Sun Java Series - Inside Java 2 Platform Security - Architecture, API Design, and Implementation, 2nd Ed (covers JAAS) - 2003 - (By Laxxuss).pdf

上传人:kuo08091 2014/5/12 文件大小:0 KB

下载得到文件列表

Sun Java Series - Inside Java 2 Platform Security - Architecture, API Design, and Implementation, 2nd Ed (covers JAAS) - 2003 - (By Laxxuss).pdf

文档介绍

文档介绍:Inside Java™ 2 Platform Security: Architecture, API Design, and Implementation, 2nd
PREFACE..............................................................................................................................................3
How This Book anized ..........................................................................................................3
Acknowledgments............................................................................................................................4
About the Authors ...........................................................................................................................6
PREFACE TO THE FIRST EDITION ........................................................................................................6
Acknowledgments for the First Edition...........................................................................................7
CHAPTER 1. COMPUTER WORK SECURITY FUNDAMENTALS ...............................................9
Cryptography puter Security ..................................................................................9
Threats and Protection............................................................................................................10
Perimeter Defense...................................................................................................................11
Access Control and Security Models.......................................................................................14
Using Cryptography................................................................................................................17
Authentication.........................................................................................................................21
Mobile Code............................................................................................................................23
Wher