Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2/e
Li Gong, Gary Ellison, Mary Dageforde
- 出版商: Addison Wesley
- 出版日期: 2003-06-06
- 售價: $1,530
- 貴賓價: 9.8 折 $1,499
- 語言: 英文
- 頁數: 384
- 裝訂: Paperback
- ISBN: 0201787911
- ISBN-13: 9780201787917
-
相關分類:
Java 程式語言、資訊安全
下單後立即進貨 (約5~7天)
買這商品的人也買了...
-
$680$537 -
$3,830$3,639 -
$860$568 -
$199$157 -
$760$600 -
$580$458 -
$590$466 -
$750$638 -
$560$476 -
$3,340$3,173 -
$550$468 -
$399$339 -
$650$553 -
$480$379 -
$750$593 -
$580$493 -
$490$382 -
$590$460 -
$875The Shellcoder's Handbook : Discovering and Exploiting Security Holes (Paperback)
-
$580$458 -
$890$703 -
$680$537 -
$580$458 -
$750$593 -
$520$406
相關主題
商品描述
Series: The Java Series
Security is an integral part of the Java platform; all Java APIs are built on a solid security model. That model has always been stronger than the security of other platforms, never allowing for the proliferation of a large virus such as “Melissa” or “I Love You.” Now improved security and robust performance peacefully coexist.
This book provides a detailed look into the central workings of the Java security architecture, including coverage of the many v1.4 enhancements. This book reviews multiple security threats, such as Trojan horses and denial of service attacks, and the strategies used to combat them. Students will find a practical guide to the deployment of Java security, as well as tips on how to customize, extend, and refine the core security architecture. In addition, it touches on the evolution of Java security, from the restrictive days of the JDK 1.0 sandbox to the sophisticated security features available in Java 2. The book even includes a list of 11 security bugs found in early versions of Java.
Table of Contents:
Preface.
Preface to the First Edition.
Computer and Network Security Fundamentals.
Basic Security for the Java Programming Language.
Java 2 Security Architecture.
Secure Class Loading.
Elements of Security Policy.
Enforcing Security Policy.
Customizing Security Policy.
Establishing Trust.
Object Security.
Programming Cryptography.
Network Security.
Deploying the Security Architecture.
Other Platforms and Future Directions.
Bibliography.