Learn how built-in JavaTM security features and tools protect your program
and system from invaders.
JavaTM 2 Cryptography Extension:
Encrypting and Decrypting Data by Monica Pawlan Release
Java 2
Read about cryptographic features available to developers in the United
States and Canada, including data encryption and decryption, key agreements,
and message authentication codes. (January 1999)
Signed Applets, Browsers, and
File Access by Monica Pawlan Release JDK 1.2
This article answers the two most frequently asked questions
about JDK 1.2 signed applets. (April 1998)
Cryptography: The
Ancient Art of Secret Messages by Monica Pawlan Release
JDK 1.2
Find out about the cryptography features available in
JDKTM 1.2 for encrypting and decrypting
network messages. (February 1998)
Is the Only Really Secure
Computer a Disconnected Computer? by Monica Pawlan Release
JDK 1.2
This article dispels this myth and explains how you now have fine-grained
control over how systems resources are accessed. (January 1998)
How Do Digital
Signatures Work? by Josh Bloch and John Papageorge Release
JDK 1.1
Just a few lines of code can get you started. Josh Bloch explains how to
use digital signatures. (July 1997)
Building a Better
Sandbox by John Papageorge
What exactly does it take to build a secure sandbox? (July 1997)
Directions in Java Security:
The JDC Interviews JavaSoft Security Guru Li Gong by John Papageorge
What's the future of Java security? Find out from an internationally
recognized expert. (July 1997)
To Top