Footnote (Chapter 2, Number 1) [Securing Java]
1
The implication here is that a Java-based attack that is successful on one platform, say, Solaris machines, will be just as successful on Windows-NT machines. Never before have cross-platform attacks been such a distinct possibility.
Close this Window
AltStyle
によって変換されたページ
(->オリジナル)
/
アドレス:
モード:
デフォルト
音声ブラウザ
ルビ付き
配色反転
文字拡大
モバイル