tailieunhanh - Teach Yourself J2EE in 21 Days phần 7

Có lẽ sẽ được một số các file bản ghi trong thư mục này, nhìn cho một trong những với ngày mới nhất về nó. Vào cuối của file bản ghi, bạn sẽ thấy một cái gì đó như sau: HTMLPage: Số lượt truy cập init là: 1 Số lượt truy cập là: 2 Số | Week 3 DAY 15 Security So far you have developed your J2EE application without considering security. Now you will look at how to add security constraints to your system to prevent loss of privacy or to keep unauthorized clients from accessing data and causing accidental or malicious damage. In today s lesson you will look at How the J2EE specification supports the common requirements for a secure system The common terminology used when discussing system security Symmetric and asymmetric encryption Securing a J2EE application using principals and roles Using declarative security for EJBs and Web pages Using programmatic security in EJBs and Web pages Supplying security credentials to an LDAP naming service provider for JNDI 654 Day 15 Security Overview Security is an essential aspect of most if not all enterprise applications. However defining an application as secure is not as easy as it sounds because the definition of secure can be interpreted in different ways. To some users a Web site is secure if they have to provide a username and password to obtain access to the Web pages. As you will see just because a site requires a user to login does not make it secure. Security Terminology Security has many aspects that can be categorized into the following areas Authentication Authorization Confidentiality Integrity Non-repudiation Auditing Each of these categories is discussed in this section. Authentication Authentication means identifying a client as a valid user of the system. Identifying a client has two components Initially confirming the client s identity Authenticating the client each time it accesses the application Initial Identification At its simplest level initial identification requires a user to simply register with an application without any additional identification. More often a third party such as the Human Resources department or manager in a company identifies a user. At its most complex level usually associated with military systems identification

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.