Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Java 9: Building Robust Modular Applications

You're reading from   Java 9: Building Robust Modular Applications Master advanced Java features and implement them to build amazing projects

Arrow left icon
Product type Course
Published in Apr 2018
Publisher Packt
ISBN-13 9781788832823
Length 910 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Authors (3):
Arrow left icon
Dr. Edward Lavieri Jr. Dr. Edward Lavieri Jr.
Author Profile Icon Dr. Edward Lavieri Jr.
Dr. Edward Lavieri Jr.
Jason Lee Jason Lee
Author Profile Icon Jason Lee
Jason Lee
Peter Verhas Peter Verhas
Author Profile Icon Peter Verhas
Peter Verhas
Arrow right icon
View More author details
Toc

Table of Contents (33) Chapters Close

Title Page - Courses
Packt Upsell - Courses
Preface
1. The Java 9 Landscape FREE CHAPTER 2. Discovering Java 9 3. Java 9 Language Enhancements 4. Building Modular Applications with Java 9 5. Migrating Applications to Java 9 6. Experimenting with the Java Shell 7. Leveraging the New Default G1 Garbage Collector 8. Microbenchmarking Applications with JMH 9. Making Use of the ProcessHandle API 10. Fine-Grained Stack Tracing 11. New Tools and Tool Enhancements 12. Concurrency and Reactive Programming 13. Security Enhancements 14. Command Line Flags 15. Best Practices In Java 9 16. Future Directions 17. Introduction 18. Managing Processes in Java 19. Duplicate File Finder 20. Date Calculator 21. Sunago - A Social Media Aggregator 22. Sunago - An Android Port 23. Email and Spam Management with MailFilter 24. Photo Management with PhotoBeans 25. Taking Notes with Monumentum 26. Serverless Java 27. DeskDroid - A Desktop Client for Your Android Phone 28. What is Next? 1. Bibliography
Index

Improving security application performance


Java Enhancement Proposal 232, titled Improving Security Application Performance, was focused on performance improvements when running applications with a security manager installed. Security managers can result in processing overhead and less than ideal application performance.

This is an impressive undertaking as current CPU overhead when running security managers is estimated to result in 10-15% performance degradation. It is not feasible to completely remove the CPU overhead as some CPU processing is required to run the security manager. That being said, the intention of this proposal (JEP-232) was to decrease the overhead percentage as much as possible.

This effort resulted in the following optimizations, each detailed in subsequent sections:

  • Security policy enforcement
  • Permission evaluation
  • Hash code
  • Package checking algorithm

Security policy enforcement

JDK 9 uses ConcurrentHashMap for mapping ProtectionDomain to PermissionCollection. ConcurrentHashMap...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image