One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is the in-depth exploration you need.Java Security, 2nd Edition, focuses on the basic platform features of Java that provide security--the class loader, the bytecode verifier, and the security manager--and recent additions to Java that enhance this security model: digital signatures, security providers, and the access controller. The book covers the security model of Java 2, Version 1.3, which is significantly different from that of Java 1.1. It has extensive coverage of the two new important security APIs: JAAS (Java Authentication and Authorization Service) and JSSE (Java Secure Sockets Extension). Java Security, 2nd Edition, will give you a clear understanding of the architecture of Java's security model and how to use that model in both programming and administration.The book is intended primarily for programmers who want to write secure Java applications. However, it is also an excellent resource for system and network administrators who are interested in Java security, particularly those who are interested in assessing the risk of using Java and need to understand how the security model works in order to assess whether or not Java meets their security needs.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Scott Oaks is a Java Technologist at Sun Microsystems, where he has worked since 1987. While at Sun, he has specialized in many disparate technologies, from the SunOS kernel to network programming and RPCs. Since 1995, hes focused primarily on Java and bringing Java technology to end-users. Scott also authored OReillys Java Security, Java Threads and Jini in a Nutshell titles.
Preface; Who Should Read This Book?; Versions Used in This Book; Conventions Used in This Book; Organization of This Book; What’s New in This Edition; How to Contact Us; Acknowledgments; Feedback for the Author; Chapter 1: Java Application Security; 1.1 What Is Security?; 1.2 Software Used in This Book; 1.3 The Java Sandbox; 1.4 Security Debugging; 1.5 Summary; Chapter 2: The Default Sandbox; 2.1 Elements of the Java Sandbox; 2.2 Permissions; 2.3 Keystores; 2.4 Code Sources; 2.5 Policy Files; 2.6 The Default Sandbox; 2.7 The java.security File; 2.8 Comparison with Previous Releases; 2.9 Summary; Chapter 3: Java Language Security; 3.1 Java Language Security Constructs; 3.2 Enforcement of the Java Language Rules; 3.3 Comparisons with Previous Releases; 3.4 Summary; Chapter 4: The Security Manager; 4.1 Overview of the Security Manager; 4.2 Operating on the Security Manager; 4.3 Methods of the Security Manager; 4.4 Comparison with Previous Releases; 4.5 Summary; Chapter 5: The Access Controller; 5.1 The CodeSource Class; 5.2 Permissions; 5.3 The Policy Class; 5.4 Protection Domains; 5.5 The AccessController Class; 5.6 Guarded Objects; 5.7 Comparison with Previous Releases; 5.8 Summary; Chapter 6: Java Class Loaders; 6.1 The Class Loader and Namespaces; 6.2 Class Loading Architecture; 6.3 Implementing a Class Loader; 6.4 Miscellaneous Class Loading Topics; 6.5 Comparison with Previous Releases; 6.6 Summary; Chapter 7: Introduction to Cryptography; 7.1 The Need for Authentication; 7.2 The Role of Authentication; 7.3 Cryptographic Engines; 7.4 Summary; Chapter 8: Security Providers; 8.1 The Architecture of Security Providers; 8.2 The Provider Class; 8.3 The Security Class; 8.4 The Architecture of Engine Classes; 8.5 Comparison with Previous Releases; 8.6 Summary; Chapter 9: Keys and Certificates; 9.1 Keys; 9.2 Generating Keys; 9.3 Key Factories; 9.4 Certificates; 9.5 Keys, Certificates, and Object Serialization; 9.6 Comparison with Previous Releases; 9.7 Summary; Chapter 10: Key Management; 10.1 Key Management Terms; 10.2 The keytool; 10.3 The Key Management API; 10.4 A Key Management Example; 10.5 Secret Key Management; 10.6 Comparison with Previous Releases; 10.7 Summary; Chapter 11: Message Digests; 11.1 Using the Message Digest Class; 11.2 Secure Message Digests; 11.3 Message Digest Streams; 11.4 Implementing a MessageDigest Class; 11.5 Comparison with Previous Releases; 11.6 Summary; Chapter 12: Digital Signatures; 12.1 The Signature Class; 12.2 Signed Classes; 12.3 Implementing a Signature Class; 12.4 Comparison with Previous Releases; 12.5 Summary; Chapter 13: Cipher-Based Encryption; 13.1 The Cipher Engine; 13.2 Cipher Streams; 13.3 Sealed Objects; 13.4 Comparison with Previous Releases; 13.5 Summary; Chapter 14: SSL and HTTPS; 14.1 An Overview of SSL and JSSE; 14.2 SSL Client and Server Sockets; 14.3 SSL Sessions; 14.4 SSL Contexts and Key Managers; 14.5 Miscellaneous SSL Issues; 14.6 The HTTPS Protocol Handler; 14.7 Debugging JSSE; 14.8 Summary; Chapter 15: Authentication and Authorization; 15.1 JAAS Overview; 15.2 Simple JAAS programming; 15.3 Simple JAAS Administration; 15.4 Advanced JAAS Topics; 15.5 Summary; The java.security File; Security Resources; Security Bugs; Third-Party Security Providers; Security References; Identity-Based Key Management; Javakey; Identities; Identity Scopes; Key Management in an Identity Scope; Summary; The Secure Java Container; The 1.1-Based Class Loader; The 1.1-Based Security Manager; Running Secure Applications; Summary; Implementing a JCE Security Provider; Quick Reference; Package java.security; Package java.security.cert; Package java.security.interfaces; Package java.security.spec; Package javax.crypto; Package javax.crypto.interfaces; Package javax.crypto.spec; Package javax.net; Package javax.net.ssl; Package javax.security.auth; Package javax.security.auth.callback; Package javax.security.auth.login; Package javax.security.auth.spi; Package javax.security.cert; Package com.sun.net.ssl; Package com.sun.security.auth; Package com.sun.security.auth.login; Package com.sun.security.auth.module; Miscellaneous Packages; Colophon;
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
GRATIS per la spedizione in U.S.A.
Destinazione, tempi e costiEUR 3,83 per la spedizione in U.S.A.
Destinazione, tempi e costiDa: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Good. 2nd Edition. Used book that is in clean, average condition without any missing pages. Codice articolo 3354772-6
Quantità: 2 disponibili
Da: Better World Books: West, Reno, NV, U.S.A.
Condizione: Very Good. 2nd Edition. Used book that is in excellent condition. May show signs of wear or have minor defects. Codice articolo 5756027-6
Quantità: 1 disponibili
Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Very Good. 2nd Edition. Used book that is in excellent condition. May show signs of wear or have minor defects. Codice articolo 5756027-6
Quantità: 1 disponibili
Da: BooksRun, Philadelphia, PA, U.S.A.
Paperback. Condizione: Good. 2. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Codice articolo 0596001576-11-1
Quantità: 1 disponibili
Da: Once Upon A Time Books, Siloam Springs, AR, U.S.A.
paperback. Condizione: Acceptable. This is a used book. It may contain highlighting/underlining and/or the book may show heavier signs of wear . It may also be ex-library or without dustjacket. This is a used book. It may contain highlighting/underlining and/or the book may show heavier signs of wear . It may also be ex-library or without dustjacket. Codice articolo mon0001136228
Quantità: 1 disponibili
Da: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 2. Codice articolo G0596001576I3N00
Quantità: 1 disponibili
Da: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 2. Codice articolo G0596001576I4N00
Quantità: 1 disponibili
Da: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 2. Codice articolo G0596001576I3N00
Quantità: 1 disponibili
Da: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 2. Codice articolo G0596001576I4N00
Quantità: 1 disponibili
Da: ThriftBooks-Phoenix, Phoenix, AZ, U.S.A.
Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 2. Codice articolo G0596001576I3N00
Quantità: 1 disponibili