Logo

Securing Java: Getting Down to Business with Mobile Code

Large book cover: Securing Java: Getting Down to Business with Mobile Code

Securing Java: Getting Down to Business with Mobile Code
by

Publisher: Wiley
ISBN/ASIN: 047131952X
ISBN-13: 9780471319528
Number of pages: 324

Description:
This book is the result of several years of thinking about mobile code and security, and includes many things we have discovered while working on real-world systems with businesses and government agencies. Our goal is to present enough information to help you separate fact from fiction when it comes to mobile code security.

Home page url

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: JXTAJXTA
by - New Riders Publishing
A guided tour of the JXTA platform, including all of the critical information required to begin producing P2P solutions built on top of JXTA. The book assumes an intermediate level of Java development knowledge, and basic knowledge of networking.
(10526 views)
Book cover: Java Distributed ComputingJava Distributed Computing
by - O'Reilly Media
This book is an overview of the tools and techniques that are at your disposal for building distributed computing systems in Java. It is intended to serve as both explanatory and reference material for you, the professional developer.
(7944 views)
Book cover: Java Platform Performance: Strategies and TacticsJava Platform Performance: Strategies and Tactics
by - Prentice Hall PTR
The authors give the experienced Java programmer strategies and tips for getting the most out of Java code. The book offers suggestions for improving programs, but it also helps you think about performance as you design and test your software.
(16098 views)
Book cover: Programming Principles in Java: Architectures and InterfacesProgramming Principles in Java: Architectures and Interfaces
by - Kansas State University
Textbook for future professional programmers. They should understand how to employ three forms of structure: control structures, data structures, and component structures. The author emphasizes component structures over the other two forms.
(16975 views)