𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Java 2 Network Security

✍ Scribed by Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok Ramani


Publisher
Charles River Media
Year
1999
Tongue
English
Leaves
702
Edition
2nd
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Java is fashionable, but is it reliable? Java is entertaining, but is it secure? Java is useful, but is it safe?The purpose of this book is to answer those questions, from the point of view of people who want to use Java, but want to do so reliably, securely and safely. That makes this book different from much recent writing on Java, which focuses, perfectly legitimately, on how a Java system can be broken into and how to avoid those dangers. On the contrary, this book focuses on how Java can be made secure and how to exploit its strengths. The goal is to provide practical help to the various groups involved in making a Java-based application or Web site into an industrial-strength commercial proposition.Various groups have different needs and different skills, which this book meets in its different parts. * The first part is aimed at the intelligent non-specialist who oversees system management or application development, or incorporates Java into the security policy. Only a basic understanding of computers and a limited exposure to Java is assumed, but all the themes of Java security are introduced in a context that stresses over and over again how Java security must be seen as an integral part of system security. * The second part goes into more detail on how Java security works, and is aimed more at system and network administrators and programmers, who need to know more of what is going on. * The third part looks at the broader context in which Java operates, including some extensions to Java security and some aspects of its future. This book explains the evolution of the Java security model, andthenfocuses on the Java 2 security architecture and its revolutionary domains of protection. It offers a very large number of examples to give you a better understanding of the technology involved.

✦ Subjects


Π‘ΠΈΠ±Π»ΠΈΠΎΡ‚Π΅ΠΊΠ°;ΠšΠΎΠΌΠΏΡŒΡŽΡ‚Π΅Ρ€Π½Π°Ρ Π»ΠΈΡ‚Π΅Ρ€Π°Ρ‚ΡƒΡ€Π°;Java;


πŸ“œ SIMILAR VOLUMES


Java 2 network security
✍ Marco Pistoia; International Business Machines Corporation.; et al πŸ“‚ Library πŸ“… 1999 πŸ› IBM Corp 🌐 English
Inside Java 2 Platform Security
✍ Li Gong, Gary Ellison, Mary Dageforde πŸ“‚ Library πŸ“… 2003 πŸ› Prentice Hall 🌐 English

Guide to the Java security platform, covering security architecture, deployment, customization, and new developments. For all user levels. Softcover.

Enterprise Java Security: Building Secur
✍ Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin πŸ“‚ Library πŸ“… 2004 πŸ› Addison-Wesley Professional 🌐 English

Written by members of IBM's software group and research division, this guide explains how various J2EE components are tied into enterprise security and how J2EE applications can take advantage of class loaders, access-control restrictions, the Java cryptography architecture, public key cryptography