Enterprise Javaa Security: Building Secure J2EEa Applications provides application developers and programmers with the know-how they need to utilize the latest Java security technologies in building secure enterprise infrastructures. Written by the leading Java security experts at IBM, this comprehe
Enterprise Java(TM) Security: Building Secure J2EE(TM) Applications
โ Scribed by Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin
- Publisher
- addison-wesley
- Year
- 2004
- Tongue
- English
- Leaves
- 608
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Enterprise Javaa Security: Building Secure J2EEa Applications provides application developers and programmers with the know-how they need to utilize the latest Java security technologies in building secure enterprise infrastructures. Written by the leading Java security experts at IBM, this comprehensive guide covers the current status of the Javaa 2 Platform, Enterprise Edition (J2EE), and Javaa 2 Platform, Standard Edition (J2SEa ), security architectures and offers practical solutions and usage patterns to address the challenges of Java security. To aid developers who need to build secure J2EE applications, Enterprise Javaa Security covers at length the J2EE security technologies, including the security aspects of servlets, JavaServer Pages(TM) (JSPa ), and Enterprise JavaBeansa (EJBa )--technologies that are at the core of the J2EE architecture. In addition, the book covers Web Services security. Examples and sample code are provided throughout the book to give readers a solid understanding of the underlying technology. The relationship between Java and cryptographic technologies is covered in great detail, including: Java Cryptography Architecture (JCA) Java Cryptography Extension (JCE) Public-Key Cryptography Standards (PKCS) Secure/Multipurpose Internet Mail Extensions (S/MIME) *Java Secure Socket Extension (JSSE)
๐ SIMILAR VOLUMES
Written by members of IBM's software group and research division, this guide explains how various J2EE components are tied into enterprise security and how J2EE applications can take advantage of class loaders, access-control restrictions, the Java cryptography architecture, public key cryptography
This book has a good chapter 4 on UML-Java mapping which is explained very clearly. Other books tends to be bombastic and theorectical and vomitting out dry, useless high level UML jargons. Since most developers knows attrbutes and methods better than say, trying to figure out what an association li
This book has a good chapter 4 on UML-Java mapping which is explained very clearly. Other books tends to be bombastic and theorectical and vomitting out dry, useless high level UML jargons. Since most developers knows attrbutes and methods better than say, trying to figure out what an association li
The quality of this book varies but most of it is outright horrible. The problem is that it seems to be written not by engineers but by techincal writers. People who don't really understand what is important, what is not, and how the things are connected. There are many details but the text goes on
Written for application component developers who are building Connector architecture applications, explaining how to connect applications not only to one another but also to a multitude of EISs and legacy systems. Softcover.