Inside Java 2 Paltform Security
Li Gong
- 出版商: Addison Wesley
- 出版日期: 1999-06-16
- 定價: $1,200
- 售價: 5.0 折 $600
- 語言: 英文
- 頁數: 262
- 裝訂: Paperback
- ISBN: 0201310007
- ISBN-13: 9780201310009
-
相關分類:
Java 程式語言、資訊安全
立即出貨(限量)
買這商品的人也買了...
-
$1,110$1,055 -
$1,400$1,330 -
$680$537 -
$399DBA's Guide to Databases on Linux
-
$200The Real-Time Specification for Java
-
$699Pure JSP: Java Server Pages
-
$350$277 -
$920$727 -
$560$476 -
$550$429 -
$650$553 -
$760$600 -
$580$458 -
$590$466 -
$680$537 -
$1,500$1,350 -
$690$538 -
$720$562 -
$780$616 -
$720$569 -
$560$442 -
$480$408 -
$400$360 -
$750$638 -
$450$360
相關主題
商品描述
"The book is of enormous consequence and potential value. The Java 2 Platform Security represents an advance of major proportions, and the information in this book is captured nowhere else." --Peter G. Neumann, Principal Scientist, SRI International Computer Science Lab, author of Computer-Related Risks, and Moderator of the Risks Forum "Profound! There are a large number of security pearls. I enjoyed and was very impressed by both the depth and breadth of the book." --Stephen Northcutt, Director of Research for Intrusion Detection and Response, SANS Institute Inside the Java 2 Platform Security is the definitive and comprehensive guide to the Java security platform. Written by the Chief Java Security Architect at Sun, it provides a detailed look into the central workings of the Java security architecture and describes security tools and techniques for successful implementation. This book features detailed descriptions of the many enhancements incorporated within the security architecture that underlies the Java 2 platform. It also provides a practical guide to the deployment of Java security, and shows how to customize, extend, and refine the core security architecture. For those new to the topic, the book includes an overview of computer and network security concepts and an explanation of the basic Java security model. You will find detailed discussions on such specific topics as: *The original Java sandbox security model *The new Java 2 Platform permission hierarchy *How Java security supports the secure loading of classes *Java 2 access control mechanisms *Policy configuration *Digital certificates *Security tools, including Key Store and Jar Signer *Secure Java programming techniques *Ways to customize the Java security architecture with new permission types *How to move legacy security code onto the Java 2 Platform In addition, the book discusses techniques for preserving object security--such as signing, sealing, and guarding objects--and outlines the Java cryptography architecture. Throughout, the book points out common mistakes and contains numerous code examples demonstrating the usage of classes and methods. With this complete and authoritative guide, you will gain a deeper understanding into how and why the Java security technology functions as it does, and will be better able to utilize its sophisticated security capabilities in the development of your applications. 0201310007B04062001