Items related to Inside Java™ 2 Platform Security: Architecture,...

Inside Java™ 2 Platform Security: Architecture, API Design, and Implementation (Java Series) - Softcover

 
9780201310009: Inside Java™ 2 Platform Security: Architecture, API Design, and Implementation (Java Series)

Synopsis

"The book is of enormous consequence and potential value. The Java 2 Platform Security represents an advance of major proportions, and the information in this book is captured nowhere else." --Peter G. Neumann, Principal Scientist, SRI International Computer Science Lab, author of Computer-Related Risks, and Moderator of the Risks Forum "Profound! There are a large number of security pearls. I enjoyed and was very impressed by both the depth and breadth of the book." --Stephen Northcutt, Director of Research for Intrusion Detection and Response, SANS Institute Inside the Java 2 Platform Security is the definitive and comprehensive guide to the Java security platform. Written by the Chief Java Security Architect at Sun, it provides a detailed look into the central workings of the Java security architecture and describes security tools and techniques for successful implementation. This book features detailed descriptions of the many enhancements incorporated within the security architecture that underlies the Java 2 platform. It also provides a practical guide to the deployment of Java security, and shows how to customize, extend, and refine the core security architecture. For those new to the topic, the book includes an overview of computer and network security concepts and an explanation of the basic Java security model. You will find detailed discussions on such specific topics as: *The original Java sandbox security model *The new Java 2 Platform permission hierarchy *How Java security supports the secure loading of classes *Java 2 access control mechanisms *Policy configuration *Digital certificates *Security tools, including Key Store and Jar Signer *Secure Java programming techniques *Ways to customize the Java security architecture with new permission types *How to move legacy security code onto the Java 2 Platform In addition, the book discusses techniques for preserving object security--such as signing, sealing, and guarding objects--and outlines the Java cryptography architecture. Throughout, the book points out common mistakes and contains numerous code examples demonstrating the usage of classes and methods. With this complete and authoritative guide, you will gain a deeper understanding into how and why the Java security technology functions as it does, and will be better able to utilize its sophisticated security capabilities in the development of your applications. 0201310007B04062001

"synopsis" may belong to another edition of this title.

About the Author

Li Gong is managing director of Sun Microsystems' Engineering and Research Institute in Beijing, China. Previously at Sun, he was engineering head of Java Security and Networking, Java Embedded Servers, and JXTA. He obtained B.S. and M.S. degrees from Tsinghua University, Beijing, and a Ph.D. from the University of Cambridge. He is associate editor-in-chief of IEEE Internet Computing.

From the Back Cover

"The book is of enormous consequence and potential value. The Java 2 Platform Security represents an advance of major proportions, and the information in this book is captured nowhere else." --Peter G. Neumann, Principal Scientist, SRI International Computer Science Lab, author of Computer-Related Risks, and Moderator of the Risks Forum

"Profound! There are a large number of security pearls. I enjoyed and was very impressed by both the depth and breadth of the book." --Stephen Northcutt, Director of Research for Intrusion Detection and Response, SANS Institute

Inside the Java 2 Platform Security is the definitive and comprehensive guide to the Java security platform. Written by the Chief Java Security Architect at Sun, it provides a detailed look into the central workings of the Java security architecture and describes security tools and techniques for successful implementation.

This book features detailed descriptions of the many enhancements incorporated within the security architecture that underlies the Java 2 platform. It also provides a practical guide to the deployment of Java security, and shows how to customize, extend, and refine the core security architecture. For those new to the topic, the book includes an overview of computer and network security concepts and an explanation of the basic Java security model.

You will find detailed discussions on such specific topics as:

  • The original Java sandbox security model
  • The new Java 2 Platform permission hierarchy
  • How Java security supports the secure loading of classes
  • Java 2 access control mechanisms
  • Policy configuration
  • Digital certificates
  • Security tools, including Key Store and Jar Signer
  • Secure Java programming techniques
  • Ways to customize the Java security architecture with new permission types
  • How to move legacy security code onto the Java 2 Platform

In addition, the book discusses techniques for preserving object security--such as signing, sealing, and guarding objects--and outlines the Java cryptography architecture. Throughout, the book points out common mistakes and contains numerous code examples demonstrating the usage of classes and methods.

With this complete and authoritative guide, you will gain a deeper understanding into how and why the Java security technology functions as it does, and will be better able to utilize its sophisticated security capabilities in the development of your applications.



0201310007B04062001

"About this title" may belong to another edition of this title.

  • PublisherAddison Wesley
  • Publication date1999
  • ISBN 10 0201310007
  • ISBN 13 9780201310009
  • BindingPaperback
  • LanguageEnglish
  • Edition number1
  • Number of pages288

Buy Used

Condition: Near Fine
Ancien livre de bibliothèque. Traces...
View this item

£ 6.76 shipping from France to United Kingdom

Destination, rates & speeds

Buy New

View this item

£ 3.35 shipping within United Kingdom

Destination, rates & speeds

Search results for Inside Java™ 2 Platform Security: Architecture,...

Stock Image

Li Gong
Published by Addison Wesley, 1999
ISBN 10: 0201310007 ISBN 13: 9780201310009
Used Softcover

Seller: Ammareal, Morangis, France

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Softcover. Condition: Bon. Ancien livre de bibliothèque. Traces de pliures sur la couverture. Légères traces d'usure sur la couverture. Pages cornées. Edition 1999. Tome 2. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Good. Former library book. Traces of creases on the cover. Slight signs of wear on the cover. Dog-eared pages. Edition 1999. Volume 2. Ammareal gives back up to 15% of this item's net price to charity organizations. Seller Inventory # E-854-196

Contact seller

Buy Used

£ 2.35
Convert currency
Shipping: £ 6.76
From France to United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Gong, Linda
Published by Pearson Education, Limited, 1999
ISBN 10: 0201310007 ISBN 13: 9780201310009
Used Softcover

Seller: Better World Books: West, Reno, NV, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: Good. Used book that is in clean, average condition without any missing pages. Seller Inventory # 51262325-75

Contact seller

Buy Used

£ 6.25
Convert currency
Shipping: £ 4.97
From U.S.A. to United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Gong, Linda
Published by Pearson Education, Limited, 1999
ISBN 10: 0201310007 ISBN 13: 9780201310009
Used Softcover

Seller: Better World Books: West, Reno, NV, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: Very Good. Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # 15680663-75

Contact seller

Buy Used

£ 6.25
Convert currency
Shipping: £ 4.97
From U.S.A. to United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Gong, Li
Published by Addison-Wesley Professional, 1999
ISBN 10: 0201310007 ISBN 13: 9780201310009
Used Paperback

Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: As New. No Jacket. Pages are clean and are not marred by notes or folds of any kind. ~ ThriftBooks: Read More, Spend Less 1.1. Seller Inventory # G0201310007I2N00

Contact seller

Buy Used

£ 4.96
Convert currency
Shipping: £ 7.46
From U.S.A. to United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Gong Li
Published by Longman Group, 1999
ISBN 10: 0201310007 ISBN 13: 9780201310009
New Softcover

Seller: Majestic Books, Hounslow, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. pp. 288. Seller Inventory # 46371036

Contact seller

Buy New

£ 52.38
Convert currency
Shipping: £ 3.35
Within United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Gong Li
Published by Longman Group, 1999
ISBN 10: 0201310007 ISBN 13: 9780201310009
New Softcover

Seller: Biblios, Frankfurt am main, HESSE, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. pp. 288. Seller Inventory # 1845362953

Contact seller

Buy New

£ 54.55
Convert currency
Shipping: £ 6.71
From Germany to United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket