Welcome to JAVA-LAND!السلام عليكم


This page was created to examine the ability of myself to design a web page.I have passion towards the field of programming languages especially programming in Java ,C,C++,Mysql,PHP and XML-related technologies.My preferred operating systems are Linux(SuSE) and windows 2000 profissional.I am starting here with those essaies and hope them be good to everyone , please feel comfort to send any essaies or article you find it good.
There is nothing for sale here. Comments, questions and suggestions are always welcome...., just click the link at the bottom of the page to send me e-mail!!

More Info About Me.

Essaies...

24/3/2005

Windows 2000 Networking:

The mapping between OSI layers and networking components of windows 2000 isn't precise, which is the reason that some components cross layers.

click here to read more

.

26/3/2005

The Virtual Filesystem of Linux:

One of Linux's keys to success is its ability to coexist comfortably with other systems. You can transparently mount disks or partitions that host file formats used by Windows, other Unix systems, or even systems with tiny market shares like the Amiga. Linux manages to support multiple disk types in the same way other Unix variants do, through a concept called the Virtual Filesystem.

click here to read more.

28/3/2005

RSA

click here to read more

29/3/2005

The Java Cryptography Architecture(JCA).

The JCA is a framework for accessing and developing cryptographic functionality for the Java platform. It encompasses the parts of the Java 2 security API related to cryptography.

click here to read more

31/3/2005

Introduction to Java 2 Enterprise Edition(J2EE).

J2EE, a superset of J2SE, manages the security of container-resident applications. J2EE provides a component-based development and deployment model. Three container types are prevalent today: JavaServer Pages (JSP), Java servlets, and Enterprise JavaBeans (EJB). The J2EE platform manages the underlying infrastructure for the components so that the application developer can focus on the application functionality and not be concerned with managing the security and computing infrastructure. When a component is installed into the container, the security requirements of the component are declared within a deployment descriptor. Once deployed, the container ensures that the security requirements of the component are met prior to dispatching into the component and throughout the life cycle of component invocations and interactions.

click here to read more

 


   


 

 

 
 [HOME]    [NEWS]     [ARTICLES]     [HOW TO]    [TIPS & TRICKS]     [LINKS]    [LEGAL STUFF]    [SEARCH]

Send mail to Me with questions or comments about this web page.
Last modified: March 24, 2005