Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Java program safety, however, can be compromised. The remainder of this chapter describes use cases under which Java programs might be exploited and examples of rules that mitigate against these attacks. Not all of the rules apply to all Java language programs; frequently, their applicability depends on how the software is deployed and your assumptions concerning trust.

 

Rules versus Recommendations

Input Validation and Data Sanitization

...