Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
2Activity

Table Of Contents

JDBC Introduction
JDBC Product Components
JDBC Architecture
A Relational Database Overview
Uses of Reflection
Drawbacks of Reflection
Trail Lessons
Advantages of Dynamic Code Loading
Remote Interfaces, Objects, and Methods
Creating Distributed Applications by Using RMI
Designing and Implementing the Application Components
Compiling Sources
Making Classes Network Accessible
Starting the Application
Building a Generic Compute Engine
Declaring the Remote Interfaces Being Implemented
Defining the Constructor for the Remote Object
Providing Implementations for Each Remote Method
Passing Objects in RMI
Creating and Installing a Security Manager
Making the Remote Object Available to Clients
Building a JAR File of Interface Classes
Building the Server Classes
Building the Client Classes
A Note About Security
Starting the Server
Starting the Client
Top-Level Containers and Containment Hierarchies
Adding Components to the Content Pane
Adding a Menu Bar
The Root Pane
1. Create the Properties Files
2. Define the Locale
3. Create a ResourceBundle
4. Fetch the Text from the ResourceBundle
Conclusion
Naming Concepts
Directory Package
LDAP Package
Event Package
Service Provider Package
Chain of Responsibilities
WebSphere Application Server 6.1
Rational UML Modeling tool
Requirement/Request Analysis
Deployment and Configuration
Performance Tuning and Review
Contents
The Extension Mechanism
Architecture
Optional Package Deployment
Bundled Optional Packages
Installed Optional Packages
Optional Package Sealing
Optional Package Security
Related APIs
Instrumentation
JMX Agent
Remote Management
1 Introduction
2 Java Language Security and Bytecode Verification
3 Basic Security Architecture
Security Providers
File Locations
4 Cryptography
5 Public Key Infrastructure
Key and Certificate Storage
PKI Tools
6 Authentication
7 Secure Communication
SSL/TLS
SASL
GSS-API and Kerberos
8 Access Control
Permissions
Policy
Access Control Enforcement
9 For More Information
Appendix A Classes Summary
Appendix B Tools Summary
Appendix C Built-in Providers
Keysize Restrictions
0 of .
Results for:
No results containing your search query
P. 1
core java

core java

Ratings: (0)|Views: 44|Likes:
Published by machi418

More info:

Published by: machi418 on Jul 10, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

09/07/2012

pdf

text

original

You're Reading a Free Preview
Pages 4 to 57 are not shown in this preview.
You're Reading a Free Preview
Pages 61 to 76 are not shown in this preview.
You're Reading a Free Preview
Pages 80 to 122 are not shown in this preview.
You're Reading a Free Preview
Pages 126 to 136 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->