|
Welcome
to JAVA-LAND!السلام عليكم This page was created to examine
the ability of myself to design a web page.I have passion towards
the field of programming
languages especially programming in Java ,C,C++,Mysql,PHP and XML-related
technologies.My preferred operating systems are Linux(SuSE) and
windows 2000 profissional.I am starting here with those essaies
and hope them be good to everyone , please feel comfort to send
any essaies or article you find it good.
There is nothing for sale here. Comments, questions
and suggestions are always welcome...., just click
the link at the bottom of the page to send me e-mail!!
More
Info About Me.
|
|
Essaies... |
24/3/2005 Windows 2000 Networking:
The mapping between OSI layers and networking components of windows 2000 isn't precise,
which is the reason that some components cross layers.
click here to read more .
|
26/3/2005 The Virtual Filesystem of Linux:
One of Linux's keys to success is its ability to coexist comfortably
with other systems. You can transparently mount disks or partitions
that host file formats used by Windows, other Unix systems, or even
systems with tiny market shares like the Amiga. Linux manages to
support multiple disk types in the same way other Unix variants do,
through a concept called the Virtual Filesystem.
click here to read more.
|
28/3/2005 RSA
click here to read more
|
29/3/2005
The Java Cryptography Architecture(JCA).
The JCA is a framework for accessing and developing cryptographic
functionality for the Java platform. It encompasses the parts of the
Java 2 security API related to cryptography.
click here to read more
|
31/3/2005
Introduction to Java 2 Enterprise Edition(J2EE).
J2EE, a superset of J2SE, manages the security of container-resident
applications. J2EE provides a component-based development and deployment
model. Three container types are prevalent today: JavaServer Pages (JSP),
Java servlets, and Enterprise JavaBeans (EJB). The J2EE platform
manages the underlying infrastructure for the components so that
the application developer can focus on the application functionality
and not be concerned with managing the security and computing
infrastructure. When a component is installed into the container, the
security requirements of the component are declared within a deployment
descriptor. Once deployed, the container ensures that the security
requirements of the component are met prior to dispatching into
the component and throughout the life cycle of component invocations
and interactions.
click here to read more
|
|
|
|