Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
The purpose of this book is to answer those questions, from the point of view of people who want to use Java, but want to do so reliably, securely and safely. That makes this book different from much recent writing on Java, which focuses, perfectly legitimately, on how a Java system can be broken into and how to avoid those dangers. On the contrary, this book focuses on how Java can be made secure and how to exploit its strengths. The goal is to provide practical help to the various groups involved in making a Java-based application or Web site into an industrial-strength commercial proposit. | Illi Java 2 Network Security Marco Pistoia Duane F. Reller Deepak Gupta Milind Nagnur Ashok K. Ramani International Technical Support Organization http www.redbooks.ibm.com SG24-2109-01 SG24-2109-01 International Technical Support Organization Java 2 Network Security Marco Pistoia Duane F. Reller Deepak Gupta Milind Nagnur Ashok K. Ramani Foreward by Li Gong Distinguished Engineer and Chief Java Security Architect Sun Microsystems Inc. June .