Table of Contents [Securing Java] (original) (raw)
![]() |
Table of Contents | ![]() |
---|
Preface | |
---|---|
Chapter One | Mobile Code and Security: Why Java Security is Important |
Chapter Two | The Base Java Security Model: The Original Applet Sandbox |
Chapter Three | Beyond the Sandbox: Signed Code in JDK 1.2 |
Chapter Four | Malicious Applets: Avoiding the Common Nuisances |
Chapter Five | Attack Applets: Exploiting Holes in the Security Model |
Chapter Six | Securing Java: Improvements, Solutions, and Snake Oil |
Chapter Seven | Java Security Guidelines: Developing and Using Java More Securely |
Chapter Eight | Java Card Security: How Smart Cards and Java Mix |
Chapter Nine | The Future of Java Security: Challenges Facing Mobile Code |
Appendix A | Frequently Asked Questions: Java Security FAQ Java versus Active X |
Appendix B | Java Security Hotlist |
Appendix C | How to Sign Java Code |
References |
Chapter... Preface -- 1 -- 2 -- 3 -- 4 -- 5 -- 6 -- 7 -- 8 -- 9 -- A -- B -- C -- Refs
Front -- Contents -- Help
Copyright ©1999 Gary McGraw and Edward Felten.
All rights reserved.
Published by John Wiley & Sons, Inc.