Index: V - e-Reading Library
start page  | rating of books | rating of authors | reviews | copyrights
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: V
- validate( ), Certificate class: 10.4.5. Revoked Certificates
 
- -validity option (keytool): A.1.3. Adding a Key Entry
 
- variables
 
  
  - array bounds checking: 2.1. Java Language Security Constructs
 
    - 2.2.3. Runtime Enforcement
 
  
 
  
  - final (constants): 2.1. Java Language Security Constructs
 
    
    - modifying: 2.2.2. The Bytecode Verifier
 
  
 
  
  - initializing: 2.1. Java Language Security Constructs
 
  
  - of security managers: 6.1.2. Protected Instance Variables in the Security Manager
 
  
  - transient: 2.1.1. Object Serialization and Memory Integrity
 
 
- -verbose option (jarsigner): A.2.1. Creating a Signed JAR File
 
- verify( )
 
  
  - Signature class: 12.1.1. Using the Signature Class
 
  
  - SignedObject class: 12.1.2. The SignedObject Class
 
  
  - X509CRL class: 10.4.5. Revoked Certificates
 
 
- -verify option: 2.2.2.3. Controlling bytecode verification
 
- verifying
 
  
  - JAR files: A.2.2. Verifying a JAR File
 
  
  - message digests: 9.1. Using the Message Digest Class
 
 
- versions of Java: 0.2. Versions Used in This Book
 
  
  - secure applications and: 1.4.2. Built-in Java Application Security
 
  
  - SPI and: 8.4. The Architecture of Engine Classes
 
  
  - trusted classes: 4.2. Trusted and Untrusted Classes
 
 
- virtual machine
 
  
  - access controller and class loaders: 3.1.1. Class Loaders and Security Enforcement
 
  
  - adding security providers: 8.1.2. Choosing a Security Provider
 
    - 8.3. The Security Class
 
  
 
  
  - casting illegally and: 2.1. Java Language Security Constructs
 
    - 2.2.3. Runtime Enforcement
 
  
 
  
  - listing security providers: 8.3. The Security Class
 
  
  - protecting with security managers: 4.3.4. Methods Protecting the Java Virtual Machine
 
  
  - reading into (see class loaders)
 
  
  - runtime bytecode verification: 2.2.3. Runtime Enforcement
 
 
- viruses: 1.1. What Is Security?
 
  
  - in commercial software: 7.1. The Need for Authentication
 
 
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2001
O'Reilly & Associates, Inc.
All Rights Reserved.