Java security

Results: 406



#Item
11

Mind Your Keys? A Security Evaluation of Java Keystores Riccardo Focardi Francesco Palmarini

Add to Reading List

Source URL: wp.internetsociety.org

- Date: 2018-02-14 16:46:29
    12

    JavaSnoop: How to hack anything in Java Arshan Dabirsiaghi Director of Research, Aspect Security Blackhat USA, Las Vegas, NV 2010

    Add to Reading List

    Source URL: media.blackhat.com

    - Date: 2012-04-07 14:53:10
      13

      LNCSQuantitative Evaluation of Systems with Security Patterns Using a Fuzzy Approach

      Add to Reading List

      Source URL: java.uom.gr

      - Date: 2015-11-06 10:19:42
        14

        E-Newsletter Specifications AppTrends, Cloud Report, Enterprise Architect, Enterprise Strategies, Java Insight, MCP Online, NET Insight, Redmond Partner Update, Redmond Report, Redmond Security Advisor, Virtualization R

        Add to Reading List

        Source URL: download.1105media.com

        - Date: 2015-02-09 15:06:25
          15

          Finding Security Vulnerabilities in Java Applications with Static Analysis V. Benjamin Livshits and Monica S. Lam Computer Science Department Stanford University {livshits, lam}@cs.stanford.edu

          Add to Reading List

          Source URL: suif.stanford.edu

          - Date: 2005-07-19 02:30:55
            16Software / Computer architecture / Computing / Cross-platform software / Oracle Database / Oracle Linux / Benchmark / MySQL / Windows Server / Linux / Oracle Corporation / Standard Performance Evaluation Corporation

            CIS CONFIGURATION ASSESSMENT TOOL (CIS-CAT) Description CIS-CAT is a configuration assessment/audit software tool available to CIS Security Benchmarks Members. Written in Java, CIS-CAT: (a) reads those CIS Security Bench

            Add to Reading List

            Source URL: benchmarks.cisecurity.org

            Language: English - Date: 2016-07-18 18:05:36
            17Computing / Software / Cryptography / Pseudorandom number generators / Computing platforms / Cross-platform software / Random number generation / Cryptographic software / /dev/random / Key generation / Entropy / Java

            Motivations PRNG Security Model Java SecureRandom Analysis

            Add to Reading List

            Source URL: www-fourier.ujf-grenoble.fr

            Language: English - Date: 2014-03-31 06:15:11
            18Computing / Software / Cross-platform software / User interface techniques / Java platform / Button / Java / Point and click / Features of the Opera web browser / Double-click

            Microsoft Word - Java security settings for Banner INB.docx

            Add to Reading List

            Source URL: ets.fhda.edu

            Language: English - Date: 2016-03-07 12:58:38
            19Computing / Software / Java platform / Cross-platform software / Java Card / Applet / Java / MIDlet / Sandbox / ActiveX / Java applet / Java virtual machine

            Language-based security for mobile code with applications to smart cards Xavier Leroy INRIA Rocquencourt &

            Add to Reading List

            Source URL: pauillac.inria.fr

            Language: English - Date: 2005-01-12 04:26:34
            20Computer access control / Computing / Computer security / Federated identity / Identity management / Free software / Java enterprise platform / OpenAM / Authentication / Single sign-on / ForgeRock / Security token

            FORGEROCK ACCESS MANAGEMENT DATASHEET ®

            Add to Reading List

            Source URL: www.forgerock.com

            Language: English - Date: 2016-07-19 20:01:17
            UPDATE