Chapter 7. J2SE Security Fundamentals

Java technology is not just for applets any more. Developers now use Java technology to build stand-alone, enterprise-class applications to enable disparate clients, such as workstations, personal computers, Java-based network computers, mobile telephones, and personal digital assistants, to access legacy databases and share applications across the network.

The J2EE security architecture builds on the basic characteristics of J2SE security. It is therefore helpful to understand J2SE security before studying the advanced features J2EE offers. This chapter describes the basic J2SE security model and introduces all the main concepts related to Java security. Chapter 8 discusses the Java 2 permission model, and ...

Get Enterprise Java™ Security: Building Secure J2EE™ Applications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.