FreeComputerBooks.com
Links to Free Computer, Mathematics, Technical Books all over the World
|
|
- Title Java Security
- Author(s) Scott Oaks
- Publisher: O'Reilly Media; Second Edition edition
- Paperback 620 pages
- eBook HTML and PDF
- Language: English
- ISBN-10: 0596001576
- ISBN-13: 978-0596001575
- Share This:
This book is a part of The Java Enterprise CD Bookshelf.
Scott Oakes' Java Security is extraordinary both for its technical depth and its readability. It provides the Java programmer with a complete overview of the Java security architecture and security classes, plus a wealth of detailed information and code examples for specific implementations. The book opens with a clear discussion of what Java security is, how the various Java sandbox models work, and how Java applications and applets execute within the security model. The following chapters look in depth at the elements of the Java security architecture: language rules, class loaders, the security manager, the access controller, and permission objects.
About the Authors- Scott Oaks is a Java Technologist at Sun Microsystems, where he has worked since 1987. While at Sun, he has specialized in many disparate technologies, from the SunOS kernel to network programming and RPCs. Since 1995, hes focused primarily on Java and bringing Java technology to end-users. Scott also authored OReillys Java Security, Java Threads and Jini in a Nutshell titles.
- Java Security
- Advanced Java
- Enterprise Java and Web Services
- Java Programming and Java EE (J2EE)
- Books by O'Reilly®
- The Java Enterprise CD Bookshelf, 7 Bestselling Books (this book is one of them)
- The Mirror Site (1) - PDF
- The Mirror Site (2) - PDF
-
The Laws Of Cryptography With Java Code (Neal R. Wagner, et al.)
This book is for Java developers who want to use cryptography in their applications or to understand how cryptography is being used in Java applications. Knowledge of the Java language is necessary, but you need not be familiar with any of the APIs discussed.
-
Java Authentication and Authorization Service (JAAS) in Action
By the end of this book, you will both understand and use the functionality in JAAS, and also be able to replace many of the pieces provided by the JDK or whatever application server you may be using with your own custom classes.
-
Pairing Apache Shiro and Java EE 7 (Nebrass Lamouchi)
Learn how to use Apache Shiro in a JavaEE7 application and how to use it in a web application. This book will help you find out what Shiro actually is, and will help you to secure your Java EE project from scratch and to understand the security philosophy.
-
Practical Guide to Building an API Back End with Spring Boot
Starting your first project with Spring Boot can be a bit daunting given the vast options that it provides. This book will guide you step by step along the way to be a Spring Boot hero in no time.
-
Java 2 Network Security (Marco Pistoia, et al)
This book provides the complete insiders guide to securing Java 2 enterprise applications, with comprehensive coverage of the new Java 2 security models. Designed to help you integrate Java 2 into your enterprise security strategies.
-
Securing Java: Getting Down to Business with Mobile Code
This book navigates the uncharted waters of mobile code security and arms the reader with the knowledge required for securing Java. It reveals a menagerie of applets that have circumvented Java security to achieve a variety of noisome and damaging ends.
-
UNIX System Security: A Guide for Users & System Administrators
This book begins by examining four high-profile breaches of UNIX security as illustrations of how a UNIX system can be attacked. It then provides the information necessary to protect against these forms of attack, and offers the tools.
-
Security of Ubiquitous Computing Systems (Gildas Avoine, et al)
It is to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework that lies along four axes: cryptographic models, cryptanalysis of building blocks, security engineering, and security assessment.
-
Security Engineering: Building Dependable Distributed Systems
It makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice, offers a lot of thoughts on how information can be made more secure by both technologies and strategies.
:
|
|