Skip to Content
Developer's Guide to Web Application Security
book

Developer's Guide to Web Application Security

by Michael Cross
April 2011
Intermediate to advanced
500 pages
16h 12m
English
Syngress
Content preview from Developer's Guide to Web Application Security
Figure 7.3 Dangerous Operations Are Not Allowed in the Sandbox
All Java code is executed in the JVM, which is essentially an interpreter that
translates the Java code and allows it to run on your PC—sort of like an interme-
diary between your Java code and your operating system. A JVM also exists in your
browser. As soon as a user surfs to your Web page with a browser, your Java applet
will begin executing on the browser virtual machine.
You may have seen or heard of various emulators available that allow your com-
puter to run programs written for another computer. For example, CCS64 is a pro-
gram for Windows that allows you to run old Commodore 64 ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security for Web Developers

Security for Web Developers

John Paul Mueller
Securing Web Applications

Securing Web Applications

Stephen Gates, Allan Liska

Publisher Resources

ISBN: 9781597490610