Professional Java Security
Jess Garms, Daniel Somerfield
- 出版商: Wrox Press
- 出版日期: 2001-06-01
- 售價: $1,900
- 貴賓價: 9.5 折 $1,805
- 語言: 英文
- 頁數: 800
- 裝訂: Paperback
- ISBN: 1861004257
- ISBN-13: 9781861004253
-
相關分類:
Java 程式語言、資訊安全
已絕版
買這商品的人也買了...
-
$1,029Fundamentals of Data Structures in C
-
$490$382 -
$420$357 -
$980$774 -
$1,890$1,796 -
$1,029Operating System Concepts, 6/e (Windows XP Update)
-
$1,860$1,767 -
$620$558 -
$580$458 -
$590$466 -
$1,740$1,653 -
$720$562 -
$720$569 -
$290$261 -
$149$149 -
$1,890$1,796 -
$750$675 -
$490$382 -
$620$558 -
$2,170$2,062 -
$560$504 -
$780$663 -
$420$332 -
$550$468 -
$390$304
相關主題
商品描述
Book overview
Security is of huge importance to the computing industry - the growth in e-commerce has brought the topic from the shadows of high-level specialists into the public eye. Nowadays breaches in security for B2C based e-tailers are big news, and damage not only the reputation of the individual organization, but also confidence in the industry as a whole.
Computer security covers a multitude of areas ranging from low-level operating system security to higher-level application security. This book concentrates on the latter, and will show you how to protect your applications with cryptography and the Java security model. Beginning with simple examples and clear descriptions of different cryptography approaches, such as symmetric and asymmetric encryption, the book will build in complexity, through consideration of public key infrastructure and SSL, to provide a comprehensive set of solutions for the enterprise Java developer.
Who is this book for?
This book is aimed at intermediate to advanced Java programmers, familiar with the concepts underpinning distributed application development such as sockets, RMI, JDBC, and J2EE technologies, however no previous experience of security or cryptography is assumed. It concentrates on teaching approaches to security, developing an understanding on building cryptography into applications and, in so doing, illustrates how the key Java cryptography components can be employed.