Categories


A three-pronged solution for identifying users

Raiting 5.00

This article discusses a three-layered method to establish the identity of the user on the other end of the communication link. This article discusses with examples the three familiar approaches for establishing the identity of the users, highlight their strength and weaknesses.

Secure communication between peers: SSL through JSSE

Raiting 5.00

This tutorial discusses implementing secure communication between peers. An important requirement of any non-trivial P2P application is secure communication between peers. This tutorial explains how to use SSL through JSSE in P2P security.

Your guide to weblet security

Raiting 5.00

This article discusses implementing security to weblets that have the same exposures as applets do. It also describes what the weblet are, what they can/cannot do by default?. It also teaches how to overcome the problems related with sandbox.

Java authorization internals

Raiting 5.00

Java authorization internals is a tutorial that tells the readers about the Java authorization architectures. This tutorial can be used by the users who have an intermediate level of Java knowledge.

Cost: Free

Application Privacy Monitoring for JDBC

Raiting 5.00

Application Privacy Monitoring for JDBC is an useful article that explains the method of implementing privacy policy enforcement on online applications using JDBC and SQL.

Cost: Free

OS: Windows 2000

What is IBM Tivoli Access Manager for Microsoft .NET?

Raiting 5.00

This tutorial is an useful guide to all those programmers who wish to integrate tivoli's enterprise security solutions on their websites so as to improve their security measures.

Cost: Free

OS: Windows 2000 / XP