Chapter 11. Network Security

Integrity without knowledge is weak and useless, and knowledge without integrity is dangerous and dreadful.

—Samuel Johnson

The importance of securing the communications path between distributed entities increases as our reliance on Internet technologies compounds. Today, transactions that only a few years ago we would trust being done only over private networks are being conducted using Internet technology. Data communications might commence within the confines of the corporate intranet, presumably a private network, or possibly traverse the open Internet. Applications, such as securities transactions, payments, online banking, payroll, and health care, barely scratch the surface of the types of things that we ...

Get Inside Java™ 2 Platform Security: Architecture, API Design, and Implementation, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.