Processing ......
FreeComputerBooks.com
Links to Free Computer, Mathematics, Technical Books all over the World
 
JAVA 2 Network Security
🌠 Top Free Data Science Books - 100% Free or Open Source!
  • Title JAVA 2 Network Security
  • Author(s) Marco Pistoia, Pistoia, Deepak Gupta, Ashok Ramani
  • Publisher: Prentice Hall PTR; 2 Pap/Dsk edition (August 4, 1999)
  • Paperback 250 pages
  • eBook HTML and PDF
  • Language: English
  • ISBN-10: 0130155926
  • ISBN-13: 978-013015592
  • Share This:  

Book Description

This book provides the complete insiders guide to securing Java 2 enterprise applications, with comprehensive coverage of the new Java 2 security models. Designed to help you integrate Java 2 into your enterprise security strategies.

The purpose of this book is to answer those questions, from the point of view of people who want to use Java, but want to do so reliably, securely and safely. That makes this book different from much recent writing on Java, which focuses, perfectly legitimately, on how a Java system can be broken into and how to avoid those dangers. On the contrary, this book focuses on how Java can be made secure and how to exploit its strengths. The goal is to provide practical help to the various groups involved in making a Java-based application or Web site into an industrial-strength commercial proposition.

  • Building secure enterprise applications with Java 2!
  • Integrating Java 2 into your overall security strategy
  • Detailed coverage for managers, developers, netadmins, and security specialists
  • Comprehensive coverage of the new Java 2 security model
  • Integrate Java 2 into your enterprise security strategies
  • Master Java's powerful Cryptography APIs
About the Authors
  • Marco Pistoia, Ph.D. has worked for IBM Corporation since January 1996 and is currently a Senior Manager and Distinguished Research Staff Member at the IBM Thomas J. Watson Research Center in New York, where he manages the Mobile Enterprise Software research group.
  • Dr. Pistoia has designed and implemented numerous analysis components and contributed large amounts of code to IBM's two main products for static quality analysis: IBM Rational Software Analyzer and IBM Security AppScan Source.
Reviews and Rating: Related Book Categories: Read and Download Links: Similar Books:
  • Pairing Apache Shiro and Java EE 7 (Nebrass Lamouchi)

    Learn how to use Apache Shiro in a JavaEE7 application and how to use it in a web application. This book will help you find out what Shiro actually is, and will help you to secure your Java EE project from scratch and to understand the security philosophy.

  • Practical Guide to Building an API Back End with Spring Boot

    Starting your first project with Spring Boot can be a bit daunting given the vast options that it provides. This book will guide you step by step along the way to be a Spring Boot hero in no time.

  • TCP/IP Sockets in Java, 2nd Ed: Practical Guide for Programmers

    This book's focused, tutorial-based approach helps the reader master the tasks and techniques essential to virtually all client-server projects using sockets in Java. It also covers several new classes and capabilities in the last few revisions of the Java.

  • Java Authentication and Authorization Service (JAAS) in Action

    By the end of this book, you will both understand and use the functionality in JAAS, and also be able to replace many of the pieces provided by the JDK or whatever application server you may be using with your own custom classes.

  • Securing Java: Getting Down to Business with Mobile Code

    This book navigates the uncharted waters of mobile code security and arms the reader with the knowledge required for securing Java. It reveals a menagerie of applets that have circumvented Java security to achieve a variety of noisome and damaging ends.

  • O'Reilly® Java Security (Scott Oaks)

    This book provides the Java programmer with a complete overview of the Java security architecture and security classes, plus a wealth of detailed information and code examples for specific implementations.

  • UNIX System Security: A Guide for Users & System Administrators

    This book begins by examining four high-profile breaches of UNIX security as illustrations of how a UNIX system can be attacked. It then provides the information necessary to protect against these forms of attack, and offers the tools.

  • Security of Ubiquitous Computing Systems (Gildas Avoine, et al)

    It is to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework that lies along four axes: cryptographic models, cryptanalysis of building blocks, security engineering, and security assessment.

  • Security Engineering: Building Dependable Distributed Systems

    It makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice, offers a lot of thoughts on how information can be made more secure by both technologies and strategies.

Book Categories
:
Other Categories
Resources and Links