Book Image

Mastering Java 11 - Second Edition

By : Dr. Edward Lavieri, Mandar Jog
Book Image

Mastering Java 11 - Second Edition

By: Dr. Edward Lavieri, Mandar Jog

Overview of this book

Java 11 is a long-term release and its new features add to the richness of the language. It emphasizes variable-type inference, performance improvements, along with simplified multithreading. The Java platform has a special emphasis on modularity, making this the programming platform of choice for millions of developers. The modern Java platform can be used to build robust software applications, including enterprise-level and mobile applications. Fully updated for Java 11, this book stands to help any Java developer enjoy the richness of the Java programming language. Mastering Java 11 is your one-stop guide to fully understanding recent Java platform updates. It contains detailed explanations of the recent features introduced in Java 9, Java 10, and Java 11 along with obtaining practical guidance on how to apply the new features. As you make your way through the chapters, you'll discover further information on the developments of the Java platform and learn about the changes introduced by the variable handles and Project Coin, along with several enhancements in relation to import statements processing. In the concluding chapters, you'll learn to improve your development productivity, making your applications more efficient. You'll also be able to get to grips with the command-line flags with respect to various utilities and the command-line utility changes featured in the current Java platform. By the end of the book, you'll have obtained an advanced level understanding of the Java platform and its recent changes.
Table of Contents (20 chapters)

Datagram Transport Layer Security

Datagram Transport Layer Security (DTLS) is a communications protocol. This protocol provides a layer of security for datagram-based applications. DTLS permits secure communications and is based on the Transport Layer Security (TLS) protocol. Embedded security helps ensure that messages are not forged, tampered with, or eavesdropped.

Let's review the relevant terminology:

  • Communication protocol: A set of rules that govern how information is transmitted.
  • Datagram: A structured transfer unit.
  • Eavesdropping: Undetected when listening to in-transit data packets.
  • Forgery: Transmission of a packet with a falsified sender.
  • Network packet: A formatted unit of data for transmission.
  • Tampering: The altering of data packets after the sender transmits them and before the intended receiver receives them.
  • TLS protocol: The most common network security...