BUY IT!
Securing Java

Previous Page
Previous Page
Table of Contents

Next Page
Next Page

Preface  
Chapter One Mobile Code and Security: Why Java Security is Important
Chapter Two The Base Java Security Model: The Original Applet Sandbox
Chapter Three Beyond the Sandbox: Signed Code in JDK 1.2
Chapter Four Malicious Applets: Avoiding the Common Nuisances
Chapter Five Attack Applets: Exploiting Holes in the Security Model
Chapter Six Securing Java: Improvements, Solutions, and Snake Oil
Chapter Seven Java Security Guidelines: Developing and Using Java More Securely
Chapter Eight Java Card Security: How Smart Cards and Java Mix
Chapter Nine The Future of Java Security: Challenges Facing Mobile Code
Appendix A
Frequently Asked Questions: Java Security FAQ
Java versus Active X
Appendix B Java Security Hotlist
Appendix C How to Sign Java Code
References  




Menu Map -- Text links below

Chapter... Preface -- 1 -- 2 -- 3 -- 4 -- 5 -- 6 -- 7 -- 8 -- 9 -- A -- B -- C -- Refs
Front -- Contents -- Help

Copyright ©1999 Gary McGraw and Edward Felten.
All rights reserved.
Published by John Wiley & Sons, Inc.