Skip to main content


Showing posts from February, 2020

Tree Traversals Program in java ( Preorder | PostOrder | InrderOrder )

                      Tree Traverseral ( PreOrder | PostOrder| InOrder )
class Node{ int key; Node left,right; public Node(int value){ key = value; left = right = null;      }      }
public class BinaryTree { Node root; BinaryTree(int value){ root = new Node(value); } BinaryTree() { root = null; }
public void printInorder(Node node){ if(node == null) { return ; } printInorder(node.left); System.out.print(node.key+ " "); printInorder(node.right); }    void printInorder() {

Introduction to Java Security

Introduction to Java Security The Java security architecture includes a large set of application programming interfaces (APIs), tools, and implementations of commonly-used security algorithms, mechanisms, and protocols. The Java security APIs span a wide range of areas. Cryptographic and public key infrastructure (PKI) interfaces provide the underlying basis for developing secure applications. Interfaces for performing authentication and access control enable applications to guard against unauthorized access to protected resources. The JDK includes a number of providers that implement a core set of security services. It also allows for additional custom providers to be installed. This enables developers to extend the platform with new security mechanisms. The JDK is divided into modules. Modules that contain security APIs include the following:

Module Description java.base Defines the foundational APIs of Java SE;  contained packages include,  and…