The Constant Pool
We said that the constant pool contains a great deal of information. In fact it contains an interesting mixture of
Read moreWe said that the constant pool contains a great deal of information. In fact it contains an interesting mixture of
Read moreThe class file contains a lot more information than its cousin, the executable file. Of course, it still contains the
Read moreMoving back to the world of Java, we see that it is a high-level programming language and that bytecode is
Read moreUnderstanding how the various components of the Java Virtual Machine (JVM) cooperate to provide a secure execution environment will enable
Read moreIn this article we show you how to apply the security features of Java 2 to applets and applications running
Read moreThe class loading mechanism plays a critical role in Java security since the class loader is responsible for locating and
Read moreA protection domain can be scoped by a set of objects that are currently directly accessible by a principal, where
Read moreThe Java programming language is one of the fastest-growing technologies in use on the Internet today. The principal reason why
Read moreJCA is described as a provider architecture. The primary principal in the design of the JCA has been to separate
Read moreIn the previous post We have discussed two parts of the world of Java, the development environment and the execution
Read more