• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Tim Cooke
  • Campbell Ritchie
  • Ron McLeod
  • Junilu Lacar
  • Liutauras Vilda
Sheriffs:
  • Paul Clapham
  • Jeanne Boyarsky
  • Henry Wong
Saloon Keepers:
  • Tim Moores
  • Tim Holloway
  • Stephan van Hulst
  • Piet Souris
  • Carey Brown
Bartenders:
  • Jesse Duncan
  • Frits Walraven
  • Mikalai Zaikin

security

 
Greenhorn
Posts: 5
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Can you, guys, give me the topics about security that SCJEA covers? What about
- signing code and granting it permissions
- exchanging files with certificates
- generating and verifying signatures
or do we only know about how controlling applets and applications?
Thanks
Olivier
 
Ranch Hand
Posts: 87
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
I think these objectives hit on security. I'm reading the Java 2 Security book (the one with the egg nest) and I've also read parts of the Sun's Security Tutorial. You will also need to cover the J2EE security stuff found in the J2EE 1.2 spec and blueprints. Also I need to know the EJB 1.1 security features. In addition, I went out and found some stuff on firewalls and protocols. I assume they will ask stuff like you have an applet that needs to talk back to the host through a firewall.
2.Common Architectures
2.2security of:
2.2.1Two tier
2.2.2Three tier
2.2.3N-tier architectures
7.Protocols:
7.1Identify a protocol, given a list of some of its features, where the protocol is one of the following:
7.1.1HTTP
7.1.2HTTPS
7.1.3IIOP
7.1.4JRMP
7.2Given a scenario description, distinguish appropriate from inappropriate protocols to implement that scenario.
7.3Select from a list, common firewall features that might interfere with the normal operation of a given protocol.
12.Security:
12.1Select from a list of security restrictions that Java 2 environments normally impose on applets running in a browser.
12.2Given an architectural system specification, identify appropriate locations for implementation of specified security features, and select suitable technologies for implementation of those features.
Scott
 
Ranch Hand
Posts: 70
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Olivier,
You can reference Java Tutorial, Security in Java 2 section, NetScape manuals and Sun Suggested book " Java 2 Network Security ".
Here is Netscape docs link. http://developer.netscape.com/docs/manuals/security/secrs/index.h
tm
hope it helps
Htet
reply
    Bookmark Topic Watch Topic
  • New Topic