Book Home

Java Security Search this book

Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: V

validate( ), Certificate class: 10.4.5. Revoked Certificates
-validity option (keytool): A.1.3. Adding a Key Entry
variables
array bounds checking: 2.1. Java Language Security Constructs
2.2.3. Runtime Enforcement
final (constants): 2.1. Java Language Security Constructs
modifying: 2.2.2. The Bytecode Verifier
initializing: 2.1. Java Language Security Constructs
of security managers: 6.1.2. Protected Instance Variables in the Security Manager
transient: 2.1.1. Object Serialization and Memory Integrity
-verbose option (jarsigner): A.2.1. Creating a Signed JAR File
verify( )
Signature class: 12.1.1. Using the Signature Class
SignedObject class: 12.1.2. The SignedObject Class
X509CRL class: 10.4.5. Revoked Certificates
-verify option: 2.2.2.3. Controlling bytecode verification
verifying
JAR files: A.2.2. Verifying a JAR File
message digests: 9.1. Using the Message Digest Class
versions of Java: 0.2. Versions Used in This Book
secure applications and: 1.4.2. Built-in Java Application Security
SPI and: 8.4. The Architecture of Engine Classes
trusted classes: 4.2. Trusted and Untrusted Classes
virtual machine
access controller and class loaders: 3.1.1. Class Loaders and Security Enforcement
adding security providers: 8.1.2. Choosing a Security Provider
8.3. The Security Class
casting illegally and: 2.1. Java Language Security Constructs
2.2.3. Runtime Enforcement
listing security providers: 8.3. The Security Class
protecting with security managers: 4.3.4. Methods Protecting the Java Virtual Machine
reading into (see class loaders)
runtime bytecode verification: 2.2.3. Runtime Enforcement
viruses: 1.1. What Is Security?
in commercial software: 7.1. The Need for Authentication


Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Library Navigation Links

Copyright © 2001 O'Reilly & Associates, Inc. All Rights Reserved.

This HTML Help has been published using the chm2web software.