Inside Java(Tm) 2 Platform Security: Architecture, Api Design, And Implementation

Inside Java(Tm) 2 Platform Security: Architecture, Api Design, And Implementation

Regular price
Sale price
Quantity must be 1 or more

Attention: For textbook, access codes and supplements are not guaranteed with used items.

Arrives in 3-7 Business Days

The book is of enormous consequence and potential value. The Java 2 Platform Security represents an advance of major proportions, and the information in this book is captured nowhere else. --Peter G. Neumann, Principal Scientist, SRI International Computer Science Lab, author of Computer-Related Risks, and Moderator of the Risks Forum Profound! There are a large number of security pearls. I enjoyed and was very impressed by both the depth and breadth of the book. --Stephen Northcutt, Director of Research for Intrusion Detection and Response, SANS Institute Inside the Java 2 Platform Security is the definitive and comprehensive guide to the Java security platform. Written by the Chief Java Security Architect at Sun, it provides a detailed look into the central workings of the Java security architecture and describes security tools and techniques for successful implementation. This book features detailed descriptions of the many enhancements incorporated within the security architecture that underlies the Java 2 platform. It also provides a practical guide to the deployment of Java security, and shows how to customize, extend, and refine the core security architecture. For those new to the topic, the book includes an overview of computer and network security concepts and an explanation of the basic Java security model. You will find detailed discussions on such specific topics as: *The original Java sandbox security model *The new Java 2 Platform permission hierarchy *How Java security supports the secure loading of classes *Java 2 access control mechanisms *Policy configuration *Digital certificates *Security tools, including Key Store and Jar Signer *Secure Java programming techniques *Ways to customize the Java security architecture with new permission types *How to move legacy security code onto the Java 2 Platform In addition, the book discusses techniques for preserving object security--such as signing, sealing, and guarding objects--and outlines the Java cryptography architecture. Throughout, the book points out common mistakes and contains numerous code examples demonstrating the usage of classes and methods. With this complete and authoritative guide, you will gain a deeper understanding into how and why the Java security technology functions as it does, and will be better able to utilize its sophisticated security capabilities in the development of your applications. 0201310007B04062001

Customer Reviews