Java security

Results: 406



#Item
401Internet protocols / Web application frameworks / Directory services / IBM WebSphere Application Server / Generic Security Services Application Program Interface / Lightweight Directory Access Protocol / IBM WebSphere / Application server / IBM Director / Computing / Java enterprise platform / Internet standards

PDF Document

Add to Reading List

Source URL: www.redbooks.ibm.com

Language: English - Date: 2003-06-24 11:51:38
402Espionage / Subscriber identity module / UICC / Removable User Identity Module / CDMA Subscriber Identity Module / Java Card / Gemalto / GlobalPlatform / European Telecommunications Standards Institute / Smart cards / Security / Technology

PDF Document

Add to Reading List

Source URL: docbox.etsi.org

Language: English - Date: 2012-01-18 10:04:14
403Government / Common Access Card / GlobalPlatform / Defense Enrollment and Eligibility Reporting System / Security token / Real-Time Automated Personnel Identification System / Identity document / Digital security / Java Card / Smart cards / Security / Cryptography

PDF Document

Add to Reading List

Source URL: www.globalplatform.org

Language: English - Date: 2011-02-25 21:17:34
404Object-oriented programming / Cross-platform software / Computer security / Object-capability model / Java / Joe-E / Capability-based security / Object / Immutable object / Computing / Software engineering / Computer programming

PDF Document

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-04-08 13:37:49
405Network architecture / Internet standards / Internet privacy / Computer network security / Computer networking / Java applet / Proxy server / File Transfer Protocol / Gopher / Computing / Internet / Internet protocols

PDF Document

Add to Reading List

Source URL: avirubin.com

Language: English - Date: 2012-11-01 14:47:53
406Risk / Hacking / Software testing / Vulnerability / Computer network security / Monica S. Lam / Application security / Cross-site scripting / Java / Computing / Cyberwarfare / Computer security

PDF Document

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2006-12-03 22:15:22
UPDATE