- C and C++
- Remotely Hosted
- Tools and Utilities
- Visual Basic
This article discusses a three-layered method to establish the identity of the user on the other end of the communication link. This article discusses with examples the three familiar approaches for establishing the identity of the users, highlight their strength and weaknesses.
This tutorial discusses implementing secure communication between peers. An important requirement of any non-trivial P2P application is secure communication between peers. This tutorial explains how to use SSL through JSSE in P2P security.
This article discusses implementing security to weblets that have the same exposures as applets do. It also describes what the weblet are, what they can/cannot do by default?. It also teaches how to overcome the problems related with sandbox.
Java authorization internals is a tutorial that tells the readers about the Java authorization architectures. This tutorial can be used by the users who have an intermediate level of Java knowledge.
OS: Windows 2000
This tutorial is an useful guide to all those programmers who wish to integrate tivoli's enterprise security solutions on their websites so as to improve their security measures.
OS: Windows 2000 / XP