
Java Security Solutions / Edition 1
by Rich Helton, Johennie HeltonISBN-10: 0764549286
ISBN-13: 9780764549281
Pub. Date: 09/05/2002
Publisher: Wiley
* Provides practical solutions, not just principles of security.
• Offers an in depth toolkit to the reader and explains how to use the tools to build a secure system.
• Introduces concepts of security patterns for designing systems, as well as security building blocks for systems.
• Discusses algorithms, cryptography and architecture.
•
Overview
* Provides practical solutions, not just principles of security.
• Offers an in depth toolkit to the reader and explains how to use the tools to build a secure system.
• Introduces concepts of security patterns for designing systems, as well as security building blocks for systems.
• Discusses algorithms, cryptography and architecture.
• Addresse security for different application servers.
Product Details
- ISBN-13:
- 9780764549281
- Publisher:
- Wiley
- Publication date:
- 09/05/2002
- Pages:
- 720
- Product dimensions:
- 9.25(w) x 7.50(h) x 1.47(d)
Table of Contents
Preface.
Acknowledgments.
Part I: Introduction to Security.
Chapter 1: Security Basics.
Chapter 2: Hackers and Their Tools.
Chapter 3: Java Security Components.
Part II: Identity and Authentication.
Chapter 4: Key Management Algorithms.
Chapter 5: Elliptic Curve Cryptography.
Chapter 6: Key Management Through the Internet Protocol.
Chapter 7: Implementing Keys with Java.
Chapter 8: Java Implementation of Key Management.
Part III: Data Integrity.
Chapter 9: Ensuring Data Integrity.
Chapter 10: Ensuring Message Authentication.
Chapter 11: Signature Integrity.
Part IV: Data Hiding.
Chapter 12: Understanding Ciphers.
Chapter 13: Extending New Ciphers with the JDK.
Chapter 14: Applying Ciphers.
Part V: Resource Access Using Java.
Chapter 15: Securing Enterprise Resources.
Chapter 16: Java Authentication and Authorization Through Kerberos.
Chapter 17: Securing Messages with the Java GSS-API.
Chapter 18: Java Access: The Security Manager.
Chapter 19: Java Authentication and Authorization Service.
Part VI: Enterprise Data Security.
Chapter 20: Working with Database Security.
Part VII: Network Access.
Chapter 21: Network Security Architecture.
Chapter 22: SSL and TLS.
Chapter 23: Java Secure Socket Extension.
Part VIII: Public Key Management.
Chapter 24: Java Digital Certificates.
Chapter 25: PKI Management.
Part IX: Enterprise Access.
Chapter 26: Java Enterprise Security and Web Services Security.
Chapter 27: Securing Client-Side Components.
Chapter 28: Securing Server-Side Components.
Chapter 29: Application Security with Java.
Index.
Customer Reviews
Average Review: