• April 01, 2004 01 Apr'04

    Java 2 Security

    This paper explores some of the internals of Java 2 security. We'll take an inside-out approach to exploring the important concepts and APIs: First we'll look at the high-level concepts that Java 2 security is based on, and then we'll examine the ...  Continue Reading

  • April 01, 2004 01 Apr'04

    Exploiting the Java Virtual Machine

    Java application and component developers have a tendency to rely on a popular fiction known as the "vanilla VM configuration." The choice to rely on the VM to provide adequate, scalable runtime facilities for "real world" applications is often made...  Continue Reading

  • April 01, 2004 01 Apr'04

    Understanding Class.forName() - Java

    Dynamic loading of Java classes at runtime provides tremendous flexibility in the development of enterprise systems. It provides for the basis of "application servers", and allows even simpler, lighter-weight systems to accomplish some of the same ...  Continue Reading

  • April 01, 2004 01 Apr'04

    Flex Integration with J2EE

    In Chapter 20 of "Developing Rich Clients with Macromedia Flex", attention is turned to the Data Service features of Macromedia Flex and the MXML markup language that allow business logic deployed within a J2EE application server to be integrated ...  Continue Reading

  • April 01, 2004 01 Apr'04

    java.security.policy: When "java.policy" Just Is Not Good Enough

    Java 2's security system is a complex, pluggable architecture that allows for Java programmers to participate in the default process, or to replace the java.policy-based implementation altogether in favor of something else. In fact, Sun favors this ...  Continue Reading

  • April 01, 2004 01 Apr'04

    Know What You Are Executing: Finding a list of Loaded Classes

    Understanding what version of your code is executing in production can be the difference between a solved bug and an embarrassing admission of ignorance. Too many times developers are caught up defending code that isn't properly migrated out to ...  Continue Reading

  • April 01, 2004 01 Apr'04

    Using Database MetaData methods appropriately

    Developing performance-oriented JDBC applications is not easy. JDBC drivers do not throw exceptions to tell you when your code is running too slow.  Continue Reading

  • April 01, 2004 01 Apr'04

    XDoclet In Action

    There are some books that you really look forward to. The reason that I was looking forward to XDoclet in Action was because the topic really needed a good book. It needed a book that covered the myriad of areas that you want to know about when ...  Continue Reading

  • April 01, 2004 01 Apr'04

    Escaping Properties Purgatory

    Throughout Java's core API, properties are used to give users and administrators more control over their applications. Consider the following three approaches to configuring a context for the Java Naming and Directory Interface (JNDI).  Continue Reading

  • April 01, 2004 01 Apr'04

    Using The Digester Component

    Web services are unimaginable without XML, and with the usage of Web services projected to boom over the next few years, there is no escaping XML. In this article, you will look at the Jakarta Commons Digester component and how it can make working ...  Continue Reading

-ADS BY GOOGLE

SearchCloudApplications

SearchSoftwareQuality

SearchHRSoftware

SearchSAP

SearchERP

DevOpsAgenda

Close