Securing Java

Previous Page
Previous Page
Table of Contents

Next Page
Next Page

Chapter OneMobile Code and Security: Why Java Security is Important
Chapter TwoThe Base Java Security Model: The Original Applet Sandbox
Chapter ThreeBeyond the Sandbox: Signed Code in JDK 1.2
Chapter FourMalicious Applets: Avoiding the Common Nuisances
Chapter FiveAttack Applets: Exploiting Holes in the Security Model
Chapter SixSecuring Java: Improvements, Solutions, and Snake Oil
Chapter SevenJava Security Guidelines: Developing and Using Java More Securely
Chapter EightJava Card Security: How Smart Cards and Java Mix
Chapter NineThe Future of Java Security: Challenges Facing Mobile Code
Appendix A
Frequently Asked Questions: Java Security FAQ
Java versus Active X
Appendix BJava Security Hotlist
Appendix CHow to Sign Java Code

Menu Map -- Text links below

Chapter... Preface -- 1 -- 2 -- 3 -- 4 -- 5 -- 6 -- 7 -- 8 -- 9 -- A -- B -- C -- Refs
Front -- Contents -- Help

Copyright ©1999 Gary McGraw and Edward Felten.
All rights reserved.
Published by John Wiley & Sons, Inc.