Chapter 2: Hackers and Their Tools

  

In This Chapter

Information assets are very important to today's business; and malicious attackers and hackers, including industry espionage, present a danger. This chapter is intended to provide information on security concerns and weaknesses that attackers have historically explored to gain access to your valuable resources. The presentation is informal and anecdotal (including my personal experience) because I believe that some knowledge, even if it is rudimentary, will help you understand where security issues may arise. It may help you realize where the technologies discussed later in the book aid in your organization's security; however, feel free to skip this chapter if you cannot wait to start with Java security, its components , and implementation.

  


Java Security Solutions
Java Security Solutions
ISBN: 0764549286
EAN: 2147483647
Year: 2001
Pages: 222

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net