Enterprise Java Security: Building Secure and Robust J2EE Applications (Paperback)
Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin
- 出版商: Addison Wesley
- 出版日期: 2004-02-27
- 定價: $1,800
- 售價: 6.0 折 $1,080
- 語言: 英文
- 頁數: 608
- 裝訂: Paperback
- ISBN: 0321118898
- ISBN-13: 9780321118899
-
相關分類:
Java 程式語言、資訊安全
立即出貨(限量) (庫存=2)
買這商品的人也買了...
-
$480$379 -
$880$695 -
$1,029Operating System Concepts, 6/e (Windows XP Update)
-
$420$328 -
$590$466 -
$580$493 -
$350$298 -
$750$675 -
$720$569 -
$560$504 -
$550$468 -
$420$328 -
$450$351 -
$850$723 -
$280$218 -
$480$379 -
$750$593 -
$720$569 -
$780$616 -
$580$199 -
$580$493 -
$580$493 -
$250$213 -
$490$417 -
$290$247
相關主題
商品描述
Table of Contents:
Foreword.
Preface.
About the Authors.
I. ENTERPRISE SECURITY AND JAVA.
1. An Overview of Java Technology and Security.
Why Java Technology for Enterprise
Applications?
Enterprise Java Technology.
Java Technology as Part of Security.
An Overview of Enterprise Security
Integration.
Time to Market.
2. Enterprise Network Security and Java
Technology.
Networked Architectures.
Network Security.
Server-Side Java Technology.
Java and Firewalls.
Summary.
II. ENTERPRISE JAVA COMPONENTS SECURITY.
3. Enterprise Java Security Fundamentals.
Enterprise Systems.
J2EE Applications.
Secure Interoperability between ORBs.
Connectors.
JMS.
Simple E-Business Request Flow.
J2EE Platform Roles.
J2EE Security Roles.
Declarative Security Policies.
Programmatic Security.
Secure Communication within a WAS
Environment.
Secure E-Business Request Flow.
4. Servlet and JSP Security.
Introduction.
Advantages of Servlets.
Servlet Life Cycle.
The Deployment Descriptor of a Web Module.
Authentication.
Authorization.
Principal Delegation.
Programmatic Security.
Runtime Restrictions for Web Components.
Usage Patterns.
Partitioning Web Applications.
5. EJB Security.
Introduction.
EJB Roles and Security.
Authentication.
Authorization.
Delegation.
Security Considerations.
6. Enterprise Java Security Deployment
Scenarios.
Planning a Secure-Component System.
Deployment Topologies.
Secure Communication Channel.
Security Considerations.
III. THE FOUNDATIONS OF JAVA 2 SECURITY.
7. J2SE Security Fundamentals.
Access to Classes, Interfaces, Fields, and
Methods.
Class Loaders.
The Class File Verifier.
The Security Manager.
Interdependence of the Three Java Security
Legs.
Summary.
8. The Java 2 Permission Model.
Overview of the Java 2 Access-Control
Model.
Java Permissions.
Java Security Policy.
The Concept of CodeSource.
ProtectionDomains.
The Basic Java 2 Access-Control Model.
Privileged Java 2 Code.
ProtectionDomain Inheritance.
Performance Issues in the Java 2 Access-Control
Model.
Summary.
9. Authentication and Authorization with JAAS.
Overview of JAAS and JAAS Terminology.
Authentication.
Authorization Overview.
JAAS and J2EE.
Additional Support for Pluggable
Authentication.
IV. ENTERPRISE JAVA AND CRYPTOGRAPHY.
10. The Theory of Cryptography.
The Purpose of Cryptography.
Secret-Key Cryptography.
Public-Key Cryptography.
11. The Java 2 Platform and Cryptography.
The JCA and JCE Frameworks.
The JCA API.
The JCE API.
JCE in Practice.
Security Considerations.
12. PKCS and S/MIME in J2EE.
PKCS Overview.
S/MIME Overview.
Signing and Verifying Transactions with PKCS and
S/MIME.
Encrypting Transactions with PKCS and
S/MIME.
Security Considerations.
Future Directions.
13. The SSL and TLS Protocols in a J2EE
Environment.
The SSL and TLS Protocols.
HTTPS.
Using the SSL Support Built into J2EE
Products.
Using SSL from within J2EE Programs.
Examples.
Summary.
V. ADVANCED TOPICS.
14. Enterprise Security for Web Services.
XML.
SOAP
WSDL.
Security for Web Services: Motivations.
Security Technologies.
Web Services Security Model Principles.
Application Patterns.
Use Scenario.
Web Services Provider Security.
Security Considerations.
Futures.
15. Security Considerations for Container
Providers.
Understanding the Environment.
Authentication.
Authorization.
Secure Communication.
Secure Association.
Access to System Resources.
Mapping Identities at Connector
Boundaries.
16. Epilogue.
VI. APPENDIXES.
Appendix A. Security of Distributed Object
Architectures.
Appendix B. X.509 Digital Certificates.
Appendix C. Technical Acronyms Used in This
Book.
Appendix D. Sources Used in This Book.
Index.
商品描述(中文翻譯)
目錄:
前言。
前言。
關於作者。
I. 企業安全與Java。
1. Java技術和安全概述。
為什麼選擇Java技術用於企業應用程式?
企業Java技術。
Java技術作為安全的一部分。
企業安全整合概述。
上市時間。
2. 企業網路安全和Java技術。
網路架構。
網路安全。
伺服器端Java技術。
Java和防火牆。
總結。
II. 企業Java元件安全。
3. 企業Java安全基礎。
企業系統。
J2EE應用程式。
ORB之間的安全互操作性。
連接器。
JMS。
簡單的電子商務請求流程。
J2EE平台角色。
J2EE安全角色。
聲明式安全策略。
程式化安全。
WAS環境內的安全通訊。
安全的電子商務請求流程。
4. Servlet和JSP安全。
介紹。
Servlet的優點。
Servlet的生命週期。
Web模組的部署描述符。
驗證。
授權。
主體委派。
程式化安全。
Web元件的運行時限制。
使用模式。
分割Web應用程式。
5. EJB安全。
介紹。
EJB角色和安全性。
驗證。
授權。
委派。
安全考慮。
6. 企業Java安全部署場景。
規劃安全元件系統。
部署拓撲。
安全通訊通道。
安全```