Java security

Results: 406



#Item
191Computing / Identity / Java enterprise platform / OpenAM / Single sign-on / Static single assignment form / International Statistical Classification of Diseases and Related Health Problems / Liferay / Identity management system / Federated identity / Identity management / Computer security

esoc European Space Operations Centre Robert-Bosch-Strasse[removed]Darmstadt Germany Tel: ([removed]

Add to Reading List

Source URL: ssa-be-vm-fe-09p.ssa.esa.int

Language: English - Date: 2014-05-05 05:04:16
192Telecommunications engineering / OBject EXchange / Vulnerability / Bluetooth profile / Java APIs for Bluetooth / Bluetooth / Technology / Wireless

Bluetooth Security Issues, threats and consequences Mark Rowe, Tim Hurman Pentest Ltd.

Add to Reading List

Source URL: www.pentest.co.uk

Language: English - Date: 2015-03-24 06:38:44
193Computer network security / Key management / Kerberos / Generic Security Services Application Program Interface / Single sign-on / Ticket Granting Ticket / Key distribution center / Cryptographic protocols / Generic Security Service Algorithm for Secret Key Transaction / Computer security / Computing / Cryptography

Simplify enterprise Java authentication with single sign-on Design secure client/server Java applications that use GSS-API and Kerberos tickets to implement SSO Faheem Khan ([removed]) Consultant

Add to Reading List

Source URL: www.ibm.com

Language: English - Date: 2013-09-18 06:43:11
194Technical communication / XML / SOAP / Password / Computer security / Java / Computing / OSI protocols / Remote procedure call

The Essentials on SAP NetWeaver Process Integration - A SAP Mentor 2010 Series Ch 5

Add to Reading List

Source URL: www.geniepress.com

Language: English - Date: 2010-07-16 21:09:04
195Security / ISO/IEC / FIPS 140 / GlobalPlatform / Card reader / Java Card / Proximity card / Subscriber identity module / Smart cards / Cryptography / Computing

Microsoft Word - 6c - SCE70 Security Policy.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-02-06 08:14:37
196Archive formats / Domain name system / Java enterprise platform / Domain Name System Security Extensions / WAR file format / Java / JAR / JSON / Computing / Internet protocols / Java platform

Microsoft Word - DENIC-26p_1.8_EN

Add to Reading List

Source URL: www.denic.de

Language: English - Date: 2014-12-19 07:01:37
197Computer programming / Stack buffer overflow / Buffer overflow / Java applet / Applet / Macromedia Authorware / Java / Stack / Computer security / Computing / Software bugs / Software engineering

Explaining the Buffer Overflow Problem: Instructional Design and Evaluation in Information Security Education Susan L. Gerhart Embry-Riddle Aeronautical University [removed]

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-10-03 18:23:51
198SAP NetWeaver Portal / SAP NetWeaver / SAP AG / Java Platform /  Enterprise Edition / Exploit / Computing platform / Vulnerability / Secure Network Communications / SAP Logon Ticket / Computing / Business software / Software

Security Research Advisory – August 16, 2011 SAP J2EE engine compromised What happened? At the 2011 BlackHat conference, which was held in Las Vegas on August 3-4, Russian researcher Alexander Polyakov revealed a vuln

Add to Reading List

Source URL: www.denyall.com

Language: English - Date: 2015-02-25 05:20:11
199Java platform / Computing platforms / Sun Microsystems / Java Card / Security Target / Java / Common Criteria / Protection Profile / Oracle Corporation / Computing / Cross-platform software / ISO standards

Java Card Protection Profile – Closed Configuration December 2012 Version 3.0 Security Evaluations

Add to Reading List

Source URL: www.oracle.com

Language: English
200Java platform / Security / Oracle Application Development Framework / Computer security / Software testing / OWASP / Java Authentication and Authorization Service / Application security / Cross-site scripting / Computing / Software / Computer network security

Security in Oracle ADF: Addressing the OWASP Top 10 Security Vulnerabilities An Oracle White Paper October[removed]Security in Oracle ADF: Addressing the

Add to Reading List

Source URL: www.oracle.com

Language: English
UPDATE