Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
328 Chapter 7 • Securing Your Java Code
; The new sandbox mechanism with Java 2 allows fine-grained
access to system resources.
How Java Handles Security
; Class-loaders are used for loading in classes from any
byte-stream.
; The byte-code verifier is used by the JVM to double-check the
integrity of Java byte-code before running it.
; Java protected domains is the API Java uses for allowing fine-
grained access to system resources.
Potential Weaknesses in Java
; Limit the number of transactions a client can perform on a
server.This can be done by providing a single login account for
each user.
; Limit the number of threads that can be created on the server ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312