JAVA SECURITY - Brossura

Oaks, Scott

 
9781565924031: JAVA SECURITY

Sinossi

Designed for experienced Java programmers, a comprehensive guide to Java security programming shows readers how to use class loaders, security managers, digital signatures, and other capabilities to create and enforce their own security policies. (Advanced).

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

Contenuti

Preface; Who Should Read This Book?; Versions Used in This Book; Conventions Used in This Book; Organization of This Book; How to Contact Us; Acknowledgments; Feedback for the Author; Chapter 1: Java Application Security; 1.1 What Is Security?; 1.2 The Java Sandbox; 1.3 Applications, Applets, and Programs; 1.4 Running a Java Application; 1.5 Summary; Chapter 2: Java Language Security; 2.1 Java Language Security Constructs; 2.2 Enforcement of the Java Language Rules; 2.3 Summary; Chapter 3: Java Class Loaders; 3.1 Security and the Class Loader; 3.2 Anatomy of a Class Loader; 3.3 Loading Classes; 3.4 Implementing a Class Loader; 3.5 Extensions to the Class Loader; 3.6 Miscellaneous Class Loading Topics; 3.7 Summary; Chapter 4: The Security Manager Class; 4.1 Overview of the Security Manager; 4.2 Trusted and Untrusted Classes; 4.3 Using the Security Manager; 4.4 Summary; Chapter 5: The Access Controller; 5.1 The CodeSource Class; 5.2 Permissions; 5.3 The Policy Class; 5.4 Protection Domains; 5.5 The AccessController Class; 5.6 Guarded Objects; 5.7 Summary; Chapter 6: Implementing Security Policies; 6.1 Protected Methods of the Security Manager; 6.2 Security Managers and the Class Loader; 6.3 Implementation Techniques; 6.4 Running Secure Applications; 6.5 Summary; Chapter 7: Introduction to Cryptography; 7.1 The Need for Authentication; 7.2 The Role of Authentication; 7.3 Cryptographic Engines; 7.4 Summary; Chapter 8: Security Providers; 8.1 The Architecture of Security Providers; 8.2 The Provider Class; 8.3 The Security Class; 8.4 The Architecture of Engine Classes; 8.5 Summary; Chapter 9: Message Digests; 9.1 Using the Message Digest Class; 9.2 Message Digest Streams; 9.3 Implementing a MessageDigest Class; 9.4 Summary; Chapter 10: Keys and Certificates; 10.1 Keys; 10.2 The KeyPairGenerator Class; 10.3 The KeyFactory Class; 10.4 Certificates; 10.5 Keys, Certificates, and Object Serialization; 10.6 Summary; Chapter 11: Key Management; 11.1 Overview of Key Management; 11.2 The KeyStore Class; 11.3 A Key Management Example; 11.4 Summary; Chapter 12: Digital Signatures; 12.1 The Signature Class; 12.2 Signed Classes; 12.3 Implementing a Signature Class; 12.4 Summary; Chapter 13: Encryption; 13.1 Export Restrictions; 13.2 The Sun Security Provider in the JCE; 13.3 Key Types in the JCE; 13.4 Secret Key Engines; 13.5 Encrypting Data; 13.6 Cipher Streams; 13.7 Symmetric Key Agreement; 13.8 Sealed Objects; 13.9 Summary; Security Tools; The keytool; The jarsigner Tool; The policytool; Files to Administer by Hand; Identity-Based Key Management; Identities; Identity Scopes; Key Management in an Identity Scope; Summary; Security Resources; Security Bugs; Third-Party Security Providers; Security References; Quick Reference; Package java.security; Package java.security.cert; Package java.security.interfaces; Package java.security.spec; Package javax.crypto; Package javax.crypto.interfaces; Package javax.crypto.spec; Miscellaneous Packages; Colophon;

Product Description

Book by Oaks Scott

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.