`
`NCSU Libraries Online Catalog: Inside Java 2 platform security : architecture, API design, and implementation
`
`M1 NCSU LIBRARIES
`
`Library Catalog
`
`Search
`V
`Search for words:
`Search within results Start Over1
`
`
`
`U
`
`' Ll“
`
`http://catalog.|ib.ncsu.edu/record/NCSU 1050269
`
`Inside Java 2 platform security : architecture, API design, and
`implementation
`_
`UGO,
`g‘
`Inside Java 2
`-&
`n Li 1
`Anthon
`Plalform Sunritv
`.wm
`- -\Pll|e.~|';n: —— '
`“my-“um
`Published:
`Reading, Mass. : Addison-Wesley, 1999.
`Browse Related subJeCts
`
`shelf 2
`
`B
`
`Description: xiv, 262 p. : ill. ; 24 cm.
`
`Format:
`
`Book
`
`_
`
`-
`
`.
`
`Java (Computer program languagefi
`
`Computer security13
`
`The book is of enormous consequence and potential value.
`The Java 2 Platform Security represents an advance of
`major proportions, and the information in this book is
`captured nowhere else. - Peter G. Neumann, Principal
`Scientist, SRI International Computer Science Lab, author
`of Computer-Related Risks, and Moderator of the Risks
`Forum Profound There are a large number of security
`pearls. I enjoyed and was very impressed by both the depth
`and breadth of the book. - Stephen Northcutt, Director of
`Research for Intrusion Detection and Response, SANS
`Institute Inside the Java 2 Platform Security is the
`definitive and comprehensive guide to the Java security
`platform. Written by the Chief Java Security Architect at
`Sun, it provides a detailed look into the central workings
`of the Java security architecture and describes security
`tools and techniques for successful implementation. This
`book features detailed descriptions of the many
`enhancements incorporated within the security
`architecture that underlies the Java 2 platform. It also
`provides a practical guide to the deployment of Java
`security, and shows how to customize, extend, and refine
`the core security architecture. For those
`Content provided by Syndetic Solutions, Inc. Terms of Use
`
`jmore [4
`
`MARC
`
`000 0120lcam 32200301 3 4500
`
`003 DLC
`
`005 19990708112155 . 0
`
`008 99052451999 maua b 001 0 eng
`
`919
`
`929
`
`la 99031645
`
`|a9291319997
`
`|a(0CoLC)41445719
`
`|aDLC |cDLC IthCcYBP |d0rLoB—B
`Iapcc
`959 9 9
`|aQA76.73.J38 |bG65 1999
`
`982 9 9
`
`|a995.8 |221
`
`|d1963-
`IaGong, Li,
`100 1
`245 1 0 IcLi Gong. IaInside Java 2 plat-Form security 2 Ibarchitecture, API design, and implementation /
`
`
`
`
`260 |c1999. IaReading, Mass. : IbAddison-Wesley,
`
`
`
`300
`laxiv, 262 p.
`: Ibill.
`,'
`|c24 cm.
`4440 |aThe Java series
`
`
`504 IaIncludes bibliographical references (p. 245-250) and index.
`505
`|g1.
`ItComputer and Network Security Fundamentals --
`|g2.
`ItBasic Security 'For the Java Language -—
`|g3.
`ItJDK 1.2 Security Architecture --
`|g4.
`ItDeploying the Security Architecture --
`|g5.
`|tCustomizing the Security Architecture --
`|g6.
`ItObject Security —-
`|g7.
`|tProgramming Cryptography -
`
`—
`|g8.
`ItFuture Directions.
`
`
`
`00
`
`Page 1 of 2
`
`GOOGLE EXHIBIT 1033
`
`
`
`6/14/2017
`
`NCSU Libraries Online Catalog: Inside Java 2 platform security : architecture, API design, and implementation
`
`|a14
`IaJava (Computer program language)
`IaComputer security.
`|ae7/2e/1999 |b01/12/2699
`
`
`
`|aAKC-7149
`
`|a1959269
`
`
`Address and Phone Number: 2 Broughton Drive, Raleigh, NC 27695—7111 (919) 515—3364 |
`
`Links
`
`s: www.1ib.ncsu.edu catalo
`2
`search.trln.or
`search?
`N=o&Ntk=Title&Ntt=%221nside+Java+2+platform+security+%3a+architecture%2c+API+design%2c+and+implementation9622
`3.h
`: ncsu.on.worldcat.or
`search?
`trin =ti% aInSIde+Java+2+ latform+securi +% a+architecture%2c+API+desi %2c+and+im lementation
`: catalo .lib.ncsu.edu record NCSU10 026 #
`. www.11b.ncsu.edu contact
`. hm: ( (catalog.lib.ncsu.edu(reguestZNCSQ 1050269
`rint
`. http z/IcatalogJih.ncsu.edu/record/NCSU105026
`vendor=NCSU%20Libraries%2oCatao &filter=RIS%20Format&encodin
`6 0018a1r =htt
`%2 2F%2 2Fsearch.trln.or
`.
`ttp:[1proxying.lib.ncsu.edu/index. hp?url=http: www.1'efworks.com/express/Exliresslmport.asp?
`format%2 Dex ort%2 26ex ort—o tion%2 Dris%2 26ex ort-skin%2 DNCSU
`9. ht_tp:((catalogJiE.ncsu.edu(list(
`I
`10. h
`. catalo .lib.ncsu.edu search?Ntk=Author&Ntt=%22
`n
`11. http:UcatalogJih.ncsu.edu/browse?callNumber=QA76.'23+.J38+G65+19_9_9&format=covers
`12. http: [/catalogJib.ncsu.edu/?Ntk=Subj ect&Ntt=%22Java+%28Computer+program+language%29%22
`13. hm}: [ [catalogJibmcsmedu(?Ntk=Subject&Ntt=%22Com2uter+securigx%22
`14. hm: [ [catalog.lib.ncsu.edu(record[NCSU1050269#10cat10n
`15. hm: [ [catalog.lib.ncsu.edu(record[NCSU1050269#details
`16. h
`: catalo .lib.ncsu.edu record NCSUlo 026 #contents
`17.h
`:
`c tal
`.li
`.n u.edu rec rd NC U10 02
`#m re
`18. hm; ( [www.llhmggg.gfigllihrgg—hgn;
`19. http:Ucatalog.lib.ncsu.edu/request/NCSU1050269#801223199 x2e
`20. http:[lcatalog.lib.ncsu.edu/?Ntk=Keyword&Ntt=%22The+Java+series%22
`
`2 2Fsearch%2 Fid%2 DI
`
`http://catalog.|ib.ncsu.edu/record/NCSU 1050269
`
`Page 2 of 2
`
`