Saturday, December 1, 2007

Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition) by Li Gong

Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition) by Li Gong, Gary Ellison, Mary DagefordePublisher: Addison-Wesley Professional; 2 edition (May 27, 2003) ISBN: 0201787911 CHM 1,2 Mb 384 pages

An expert tour of security on the new Java 2 platform, Inside Java 2 Security will find an enthusiastic audience among advanced Java developers and system administrators. As the author notes during the general discussion on network security, safeguarding your system goes far beyond mere cryptography.This book reviews multiple security threats and the strategies used to combat them, such as denial of service attacks, Trojan horses, and covert channels. In addition, it touches on the evolution of Java security from the restrictive days of the JDK 1.0 sandbox to the sophisticated security features available in Java 2, including a section that presents a list of 11 security bugs found in early versions of Java.Because Java 2 security is now policy-based, it must be managed by system administrators as part of enterprise security. A chapter on Java 2 security presents the "big picture" as well as the classes used to implement policy-based security where developers can control access to an entire system like files, network resources, or runtime permissions on code. The book also discusses the rather primitive tools used for Java 2 security management such as the policytool utility. For advanced developers, further sections demonstrate how to create new permission classes and how to make JDK 1.1 security code migrate to Java 2.A section on the Java Cryptography Architecture (JCA) shows that Java 2 supports the latest in encryption standards like SHA, DSA, RSA, and X.509 certificates. The text concludes with some well-considered predictions for the future of security on the Java platform. In the meantime, this book shows you what you will need to know about security when committing to Java 2 on the enterprise. Security is now part of the picture and will require both extra development time and administrative effort. --Richard Dragan

http://rapidshare.com/files/4971662/ebook.addison_wesley-inside_java_2_platform_security_second_edition.sharereactor.chm


http://depositfiles.com/files/401309

http://www.icefile.net/index.php?page=main&id=17ed41624&name=ebook.addison_wesley-inside_java_2_platform_security_second_edition.sharereactor.chm

No comments: