Inside Java 2 platform security
Architecture, API Design, and Implementation
Li Gong - Collection The Java series
Résumé
- --Peter G. Neumann, Principal Scientist, SRI
International Computer Science Lab, author of
Computer-Related Risks, and Moderator of the Risks
Forum
"Profound! There are a large number of security pearls.
I enjoyed and was very impressed by both the depth and
breadth of the book."
- --Stephen Northcutt, Director of Research for
Intrusion Detection and Response, SANS Institute
Inside the Java 2 Platform Security is the definitive and comprehensive guide to the Java security platform. Written by the Chief Java Security Architect at Sun, it provides a detailed look into the central workings of the Java security architecture and describes security tools and techniques for successful implementation.
This book features detailed descriptions of the many
enhancements incorporated within the security architecture
that underlies the Java 2 platform. It also provides a
practical guide to the deployment of Java security, and
shows how to customize, extend, and refine the core
security architecture. For those new to the topic, the book
includes an overview of computer and network security
concepts and an explanation of the basic Java security
model.
You will find detailed discussions on such specific topics
as:
- The original Java sandbox security model
- The new Java 2 Platform permission hierarchy
- How Java security supports the secure loading of
classes
- Java 2 access control mechanisms
- Policy configuration
- Digital certificates
- Security tools, including Key Store and Jar
Signer
- Secure Java programming techniques
- Ways to customize the Java security architecture with
new permission types
- How to move legacy security code onto the Java 2
Platform
In addition, the book discusses techniques for preserving
object security--such as signing, sealing, and guarding
objects--and outlines the Java cryptography architecture.
Throughout, the book points out common mistakes and
contains numerous code examples demonstrating the usage of
classes and methods.
With this complete and authoritative guide, you will gain a
deeper understanding into how and why the Java security
technology functions as it does, and will be better able to
utilize its sophisticated security capabilities in the
development of your applications.
L'auteur - Li Gong
is managing director of Sun Microsystems' Engineering
and Research Institute in Beijing, China. Previously at
Sun, he was engineering head of Java Security and
Networking, Java Embedded Servers, and JXTA. He obtained
B.S. and M.S. degrees from Tsinghua University, Beijing,
and a Ph.D. from the University of Cambridge. He is
associate editor-in-chief of IEEE Internet Computing.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Addison Wesley |
Auteur(s) | Li Gong |
Collection | The Java series |
Parution | 15/07/1999 |
Nb. de pages | 262 |
Format | 18,7 x 23,4 |
Poids | 450g |
EAN13 | 9780201310009 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse