O'Reilly logo

Core Java™ Volume II–Advanced Features, Eighth Edition by Gary Cornell, Cay S. Horstmann

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Security

<feature><title></title> <objective>

CLASS LOADERS

</objective>
<objective>

BYTECODE VERIFICATION

</objective>
<objective>

SECURITY MANAGERS AND PERMISSIONS

</objective>
<objective>

USER AUTHENTICATION

</objective>
<objective>

DIGITAL SIGNATURES

</objective>
<objective>

CODE SIGNING

</objective>
<objective>

ENCRYPTION

</objective>
</feature>

When Java technology first appeared on the scene, the excitement was not about a well-crafted programming language but about the possibility of safely executing applets that are delivered over the Internet (see Volume I, Chapter 10 for more information about applets). Obviously, delivering executable applets is practical only when the recipients are sure that the code can’t wreak havoc on their machines. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required