Introduction

  

Most people practice some form of security every day, such as locking their houses and putting their keys and wallets in their pockets or purses. Similarly, organizations need to use security techniques to protect their resources and information. No company gives away its assets unless it no longer wishes to stay in business, and information is one of the most important and strongest assets a company has. This chapter explores the basic security concepts of authentication, authorization, confidentiality, and integrity and discusses why these concepts are relevant to an enterprise solution. It also presents some basic examples of security techniques that will be expanded upon in later chapters.

  


Java Security Solutions
Java Security Solutions
ISBN: 0764549286
EAN: 2147483647
Year: 2001
Pages: 222

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net