Developing secure enterprise Java applications

Feature

Developing secure enterprise Java applications


Michelle Davidson, editor Increasingly Web applications are under attack, which has companies scrambling to make sure their applications are secure. Java applications are not immune to this, unfortunately, but there are steps you can take now to ensure your applications' security -- before attackers set their sights on them.

These articles offer tips and information specific to Java application security. They'll help you understand the basics of Java application security and then give you details for approaching this issue.

If you know of an article, tip, tool or code sample that should be included, send me an e-mail with the information and I'll add it. -- Michelle Davidson, Site Editor.

TABLE OF CONTENTS
   Java Security Basics
   Java Security Features and Mechanisms
   Java Threats and Vulnerabilities
   Java vs. .NET
   Java and Web Services
   Java Security Code Samples
   Java Security Tools
   Other Useful Resources

  Java Security Basics

[Return to Table of Contents]

  Java Security Features & Mechanisms

[Return to Table of Contents]

  Java Threats & Vulnerabilities

[Return to Table of Contents]

  Java vs. .NET

[Return to Table of Contents]

  Java and Web Services

[Return to Table of Contents]

  Java Security Code Samples

[Return to Table of Contents]

  Java Security Tools

[Return to Table of Contents]

Articles and reviews

Tool Web sites

  Other Useful Resources

[Return to Table of Contents]

Ramesh NagappanExpert advice on Java security

Do you have a question about enterprise Java security that you're having trouble getting answered? Java security expert Ramesh Nagappan can help. Read advice he has given or submit your own questions.



Send in your suggestions
Are there other topics you'd like to see learning guides on? Send site editor Michelle Davidson an e-mail at mdavidson@techtarget.com and let her know what they are.


Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

This was first published in April 2006

 

COMMENTS powered by Disqus  //  Commenting policy