home | O'Reilly's CD bookshelfs | FreeBSD | Linux | Cisco | Cisco Exam  


Book Home

Java™ Distributed Computing Search this book

Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: J

Java Cryptography Extension (JCE): 5.2.2. The Core Security API
Cipher class: 5.6.1. Ciphers for Secure Data Transfers
Java language
advantages for distributed computing: 1.3. What Does Java Provide?
distributed object schemes: 3.4. Distributed Object Schemes for Java
comparison between: 3.7. RMI vs. CORBA
CORBA: 3.5. CORBA
Java RMI: 3.6. Java RMI
event model: 6.6.1. Event Model Overview
B.2.3. Comparison to the Java Event Model
multithreading support: 1.3.7. Multithreading Support
network support of: 1.3.5. Network Support
as RMI's exclusive language: 3.7.1. The Language Barrier: Advantage or Disadvantage?
security: 1.3.6. Security
5.1. Security Issues and Concerns
Java RMI: 3.6. Java RMI
collaborating with: 9.3.2. Collaborating with RMI
CORBA versus: 3.7. RMI vs. CORBA
B.1.1. Comparison to the RMI Registry
message passing with: 6.7. Using Remote Objects
quick reference: D. RMI Quick Reference
Registry: 3.6.3. The RMI Registry
security manager for: 3.6.5. Registering and Using a Remote Object
Java Security API (java.security): 1.3.6.2. Secure remote transactions
5.2. The java.security Package
B.3.3. Comparison to the Java Security API
acl package: 5.3.1. Access Control Lists
Cipher class: 5.6.1. Ciphers for Secure Data Transfers
Key interface: 5.4.3. Keys in the Java Security API
Java Virtual Machine (JVM): 1.3.3. Platform Independence
java.io package: 1.3.5. Network Support
2.1.4. Streams, Readers, and Writers for Input and Output
java.net package: 2.1. Sockets and Streams
2.2. URLs, URLConnections, and ContentHandlers
java.rmi package: D.1. The java.rmi Package
java.rmi.Naming interface (see naming service)
java.rmi.server package: D.3. The java.rmi.server Package
JavaSpace interface: C.4. The JavaSpace Interface
JavaSpaces system: C. JavaSpaces
JCE (Java Cryptography Extension): 5.2.2. The Core Security API
Cipher class: 5.6.1. Ciphers for Secure Data Transfers
JDBC API: 7.1. An Overview of JDBC
driver configuration: 7.2.1. JDBC Driver Configurations
JDBC-enabled data objects: 7.2.4. JDBC-Enabled Data Objects
multi-database applications: 7.3. Multi-Database Applications
JIT (just-in-time) compilers: 3.7.1. The Language Barrier: Advantage or Disadvantage?
joinGroup( ): 2.1.3. Multicast Sockets
JVM (see Java Virtual Machine)


Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Library Navigation Links

Copyright © 2001 O'Reilly & Associates, Inc. All Rights Reserved.