Useful Links
Computer Science
Cybersecurity
Java Security
1. Introduction to Java Security
2. The Java Sandbox Architecture
3. Permissions and Security Policies
4. Java Cryptography Architecture
5. Java Cryptography Extension
6. Secure Communication
7. Authentication and Authorization
8. Secure Coding Practices
9. Modern Java Security Features
10. Security Testing and Analysis
Modern Java Security Features
Module System Security
Strong Encapsulation
Package Visibility Control
Reflection Restrictions
Deep Reflection
Module Boundaries
Access Control
Dependency Management
Service Loading
Module Directives
Requires Directives
Exports Directives
Opens Directives
Provides Directives
Security Manager Evolution
Deprecation Timeline
Java 17 Deprecation
Removal Plans
Migration Timeline
Alternative Security Models
Container-Based Security
Operating System Security
Process Isolation
Migration Strategies
Code Assessment
Alternative Implementations
Testing Approaches
Enhanced Cryptography
Algorithm Updates
Deprecated Algorithms
Recommended Algorithms
Default Algorithm Changes
Protocol Support
TLS 1.3 Implementation
Modern Cipher Suites
Perfect Forward Secrecy
Quantum-Resistant Cryptography
Post-Quantum Algorithms
Migration Planning
Implementation Considerations
Deserialization Security
Built-in Filtering
Global Filters
Context-Specific Filters
Filter Configuration
Filter Implementation
Pattern-Based Filtering
Custom Filter Logic
Performance Considerations
Monitoring and Logging
Deserialization Events
Security Violations
Audit Trails
Previous
8. Secure Coding Practices
Go to top
Next
10. Security Testing and Analysis