A B C D E F G H I J K L M All
N O P Q R S T U V W X Y Z #

All > Law > E-Discovery

All > Technology > Parallel Computing > Cloud Computing > Amazon Web Services

All > Technology > Programming > Java

  • Comprises a number of cooperating system components, ranging from security managers that execute as part of the application, to security measures designed into the Java virtual machine and the language itself. The sandbox ensures that an untrusted, and possibly malicious, application cannot gain access to system resources.

    Sun Microsystems - Cite This Source - This Definition

x 21,422

x 16,423

x 6,776

x 6,426

x 6,209

x 6,098

x 5,092

x 4,848

x 4,219

x 3,749

x 3,642

x 3,299

x 3,145

x 2,736

x 2,058

x 1,863

x 1,691

x 1,594

x 1,274

x 1,129

x 1,113

x 1,096

x 1,094

x 1,088

x 1,058

x 1,057

x 1,050

x 1,047

x 1,033

x 938

x 867

x 774

x 731

x 688

x 688

x 663

x 654

x 640

x 640

x 640

x 636

x 558

x 547

x 541

x 512

x 498

x 465

x 455

x 418

x 384

x 383

x 359

x 318

x 307

x 302

x 280

x 272

x 262

x 252

x 222

x 222

x 217

x 211

x 209

x 209

x 204

x 203

x 201

x 193

x 191

x 188

x 183

x 180

x 172

x 172

x 169

x 169

x 168

x 164

x 163

x 163

x 161

x 160

x 151

x 151

x 148

x 148

x 147

x 145

x 139

x 133

x 116

x 115

x 111

x 110

x 108

x 105

x 92

x 83

x 83

x 78

x 75

x 70

x 70

x 69

x 67

x 57

x 56

x 53

x 51

x 45

x 44

x 34

x 33

x 32

x 28

x 18

x 18

x 13

x 7

x 7

x 6

x 5

x 4

ExpertGlossary.com