Skip to main content
View articles by: Most Recent |
Topics | Columns |

Authors

Articles by Topic

• Accessibility     • Ajax     • Community     • Databases     • Deployment     
• Distributed     • Education     • EJB     • Extreme Programming     • GUI     
• J2EE     • J2ME     • J2SE     • JavaFX     • JavaOne     
• JSP     • JSR     • Linux     • Mobility     • NetBeans     
• Open Source     • Patterns     • Performance     • Programming     • Research     
• Search     • Security     • Servlets     • Struts     • Swing     
• Testing     • Tools     • Web Applications     • Web Design     • Web Development Tools     
• Web Services and XML     



Security

Denis Pilupchuk looks at the problems of the Java permissions model and considers some alternatives.
2008-09-30
Eric Speigelberg shows how to use JSTL's URL encoding and a servlet filter to obfuscate or even encode parameters in each direction to thwart parameter-hacking.
2008-05-20
The all-Java database JavaDB is known for its embeddability, but what about security? Can you put it out there for enterprise applications and keep data safe? Masoud Kalali shows the steps you can take to secure your JavaDB data.
2007-03-20
JAAS' limitations and assumptions have made it difficult to integrate with other enterprise technologies. However, by exposing it as a service, you can rely on JAAS in your SOA. Denis Pilipchuk shows how it's done.
2007-02-06
Denis Pilipchuk looks at JAAS' incomplete integration with Java EE And SOA, and assesses future directions for JAAS.
2006-09-14
Zarar Siddiqi shows how to instrument your web application for remote monitoring with a variety of JMX tools.
2005-11-15
Stephen Enright shows strategies of server-side input validation to prevent attackers from gaining unintended access to your web application and its back end.
2005-09-08
Want to support login and controlled access to your JSPs? LDAP is great, but configuring OpenLDAP for use with Tomcat is not straightforward. In this article, Darren Duke shows you how to bring the two together.
2005-05-31
This article considers code obfuscation for what it is: an attempt to make the bad guy's job harder. If you lock your front door at night, you agree. That lock won't stop even a slightly determined person--yet you do it. Why? Because it stops some professionals and sends some to easier targets. If you have code to protect (not everyone does), obfuscating it is a cheap, fast step...
2004-10-22
In this excerpt from his book <i>J2EE Security: For Servlets, EJBs, and Web Services</i>, author Pankaj Kumar describes Java APIs for securing items that are sent over the network where others may be snooping.
2003-11-18