Index: A - e-Reading Library
start page  | rating of books | rating of authors | reviews | copyrights
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: A
- access controller: 1.3.1. Anatomy of a Java Application
 
  - 5. The Access Controller
 
  - 5.2. Permissions
 
  - (see also permissions)
 
  
  - AccessController class: 5.5. The AccessController Class
 
  
  - class loaders and: 3.1.1. Class Loaders and Security Enforcement
 
  
  - CLASSPATH variable and: 1.4.2. Built-in Java Application Security
 
  
  - code sources: 5.1. The CodeSource Class
 
  
  - guarded objects: 5.6. Guarded Objects
 
  
  - Policy class: 5.3. The Policy Class
 
  
  - protection domains: 5.4. Protection Domains
 
  
  - security manager and: 5. The Access Controller
 
    - 6.3.6. Establishing a Security Policy in 1.2
 
  
 
 
- access levels: 2.1. Java Language Security Constructs
 
  
  - object serialization and: 2.1.1. Object Serialization and Memory Integrity
 
 
- AccessControlContext class: 6.3.6. Establishing a Security Policy in 1.2
 
  - D.1. Package java.security
 
 
- AccessController: D.1. Package java.security
 
- accessible flag, permission to set: 5.2.2. Permissions of the Java API
 
  - D.8. Miscellaneous Packages
 
 
- accessing
 
  
  - files, security managers and: 4.3.2. Methods Relating to File Access
 
  
  - memory (see casting illegally)
 
  
  - network, security managers and: 4.3.3. Methods Relating to Network Access
 
 
- actions of permissions: 5.2.1. The Permission Class
 
  - 5.2.1. The Permission Class
 
  - (see also specific permission type)
 
 
- add( ), PermissionCollection class: 5.2.5. Permission Collections
 
- addCertificate( ), Identity class: B.1.1.1. Using the identity class
 
  - B.1.1.3. The Identity class and the security manager
 
 
- addIdentity( ), IdentityScope class: B.2.1. Using the IdentityScope Class
 
  - B.2.3. IdentityScope and the Security Manager
 
 
- addProvider( ), Security class: 8.3. The Security Class
 
- algorithm classes: 8.1.1. Components of the Architecture
 
- AlgorithmParameterGenerator class: D.1. Package java.security
 
- AlgorithmParameterGeneratorSpi class: D.1. Package java.security
 
- AlgorithmParameters class: D.1. Package java.security
 
- AlgorithmParameterSpec interface: 10.3.3.2. The AlgorithmParameterSpec interface
 
  - D.4. Package java.security.spec
 
 
- AlgorithmParametersSpi class: D.1. Package java.security
 
- algorithms, cipher: 13.5.2. Cipher Algorithms
 
- -alias option (keytool): A.1.1. Global Options to keytool
 
- aliases( ), KeyStore class: 11.2. The KeyStore Class
 
- aliases for keystore entries: 11.2. The KeyStore Class
 
  - A.1. The keytool
 
 
- <<ALL FILES>> token: 5.2.2. Permissions of the Java API
 
  - 6.3.6. Establishing a Security Policy in 1.2
 
 
- allowSystemProperty property: 5.3.1. The Default Policy
 
- AllPermission class: 5.2.2. Permissions of the Java API
 
  - D.1. Package java.security
 
 
- applets
 
  
  - applet class loaders: 3.2.2. The Applet Class Loader
 
  
  - applications vs.: 1.3. Applications, Applets, and Programs
 
  
  - file access and: 4.3.2. Methods Relating to File Access
 
  
  - network access and: 4.3.3. Methods Relating to Network Access
 
  
  - network services and: 4.3.3. Methods Relating to Network Access
 
  
  - security managers and: 4.1. Overview of the Security Manager
 
    - 4.1. Overview of the Security Manager
 
    - 4.3.1. Setting a Security Manager
 
  
 
 
- applications
 
  
  - applets vs.: 1.3. Applications, Applets, and Programs
 
  
  - built-in security: 1.4.2. Built-in Java Application Security
 
  
  - elements of: 1.3.1. Anatomy of a Java Application
 
  
  - running: 1.4. Running a Java Application
 
    
    - JavaRunner for (example): 1.4. Running a Java Application
 
    
    - Launcher for: 1.4.2. Built-in Java Application Security
 
  
 
  
  - security managers and: 4.1. Overview of the Security Manager
 
    - 4.1. Overview of the Security Manager
 
    - (see also security managers)
 
  
 
 
- array bounds checking: 2.1. Java Language Security Constructs
 
  - 2.2.3. Runtime Enforcement
 
 
- associations, provider: 8.2.2. Implementing the Provider Class
 
- authentication: 1.3.1. Anatomy of a Java Application
 
  - 7.1. The Need for Authentication
 
 
- Authenticator class, interacting with: 5.2.2. Permissions of the Java API
 
- author authentication: 7.1.1. Author Authentication
 
- AWTPermission class: 5.2.2. Permissions of the Java API
 
  - 6.3.6. Establishing a Security Policy in 1.2
 
  - D.8. Miscellaneous Packages
 
  
  - permissions for: 5.2.2. Permissions of the Java API
 
 
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2001
O'Reilly & Associates, Inc.
All Rights Reserved.