* Provides practical solutions, not just principles of security.
* Offers an in depth toolkit to the reader and explains how to use the tools to build a secure system.
* Introduces concepts of security patterns for designing systems, as well as security building blocks for systems.
* Discusses algorithms, cryptography and architecture.
* Addresse security for different application servers.
"Sinopsis" puede pertenecer a otra edición de este libro.
Rich Helton has more than two decades of experience in computer and security systems. For the last twelve years, he has built secure NFS, Internet, and intranet systems as well as monitoring software for a wide variety of companies. He has served as lead Java architect specializing in security in such industries as brokerage, financial, telecommunications, and logistics. He is a certified Sun Java Developer, Sun Java Programmer, and BEA WebLogic 6.0 Developer, and he holds a masters degree in com-puter science from the University of Colorado. He contributed to BEA WebLogic Server Bible (Wiley, 2002).
Johennie Helton has nearly a decade of experience in object-oriented design and implementation for the automotive, financial, healthcare, and retail industries. She has a masters degree in computer science from the University of Colorado. She contributed chapters to Java Data Access: JDBC, JNDI, and JAXP (Wiley, 2002).
Your complete guide to the what, why, where, and how of Java Security
In this unique guide, two Java security experts show you how to take full advantage of Java security technologies-cryptography, algorithms, and architecture. They explain today's Java security tools, concepts, protocols, and specifications, including ECC, RSA, MAC, ciphers, Kerberos, JAAS, JSSE, IPSec, X.509 certificates, PKI, and RMI. The book not only describes what each of the technologies is but also explains why it exists, when you should use it, and how to implement it. Packed with practical security solutions and lots of source code examples, it delivers all the know-how you need to work with Java security components and extend them in the real world.
This book enables you to:
* Apply Java security features effectively and efficiently
* Implement the cryptography components of JDK 1.4
* Work with security algorithms and ciphers
* Maintain secure communications within the enterprise
* Add security features to enterprise applications
* Ensure message authentication and data integrity
* Understand network security architecture
* Work with authentication, authorization, confidentiality, non-repudiation, and integrity
The companion Web site includes updates, references, and source code examples from the book.
"Sobre este título" puede pertenecer a otra edición de este libro.
Librería: Hawking Books, Edgewood, TX, Estados Unidos de America
Condición: Very Good. Very Good Condition. Tear on cover. Five star seller - Buy with confidence! Nº de ref. del artículo: X0764549286X2
Cantidad disponible: 1 disponibles
Librería: HPB-Red, Dallas, TX, Estados Unidos de America
paperback. Condición: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Nº de ref. del artículo: S_456389746
Cantidad disponible: 1 disponibles