Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java Security (2nd Edition)

Buy
Java Security (2nd Edition), 9780596001575 (0596001576), O'Reilly, 2001
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is the in-depth exploration you need.

"Java Security," 2nd Edition, focuses on the basic platform features of Java that provide security--the class loader, the bytecode verifier, and the security manager--and recent additions to Java that enhance this security model: digital signatures, security providers, and the access controller. The book covers the security model of Java 2, Version 1.3, which is significantly different from that of Java 1.1. It has extensive coverage of the two new important security APIs: JAAS (Java Authentication and Authorization Service) and JSSE (Java Secure Sockets Extension). "Java Security," 2nd Edition, will give you a clear understanding of the architecture of Java's security model and how to use that model in both programming and administration.

The book is intended primarily for programmers who want to write secure Java applications. However, it is also an excellent resource for system and network administrators who are interested in Java security, particularly those who are interested in assessing the risk of using Java and need to understand how the security model works in order to assess whether or not Java meets their security needs.

Guide to writing and deploying secure applications with Java, offering those writing real-world software for the Internet and those deploying software written in Java. Shows how to grant the desired classes access to programs while shutting out unwanted other classes. Covers Java 1.1, 2, and 1.2.1. Softcover.

About the Author

Scott Oaks is a Java technologist at Sun Microsystems, where he has worked since 1987. While at Sun, he has specialized in many disparate technologies, from the SunOS kernel to network programming and RPCs. Since 1995 he has primarily focused on Java and

(HTML tags aren't allowed.)

IBM Certification Study Guide Aix Communications
IBM Certification Study Guide Aix Communications
The AIX and RS/6000 certifications offered through the Professional Certification Program from IBM are designed to validate the skills required of technical professionals who work in the powerful, and often complex, environments of AIX and RS/6000. A complete set of professional certifications are available. They include:
Principles of Data Integration
Principles of Data Integration

How do you approach answering queries when your data is stored in multiple databases that were designed independently by different people? This is first comprehensive book on data integration and is written by three of the most respected experts in the field.

This book provides an extensive introduction to the theory and concepts...

Data Warehousing Fundamentals for IT Professionals
Data Warehousing Fundamentals for IT Professionals

Cutting-edge content and guidance from a data warehousing expert—now expanded to reflect field trends

Data warehousing has revolutionized the way businesses in a wide variety of industries perform analysis and make strategic decisions. Since the first edition of Data Warehousing Fundamentals, numerous...


Windows® Internals: Including Windows Server 2008 and Windows Vista, Fifth Edition (PRO-Developer)
Windows® Internals: Including Windows Server 2008 and Windows Vista, Fifth Edition (PRO-Developer)

See how the core components of the Windows operating system work behind the scenes—guided by a team of internationally renowned internals experts. Fully updated for Windows Server 2008 and Windows Vista, this classic guide delivers key architectural insights on system design, debugging, performance, and support—along with...

Win the Crowd: Unlock the Secrets of Influence, Charisma, and Showmanship
Win the Crowd: Unlock the Secrets of Influence, Charisma, and Showmanship

Would You Like to Become More Commanding, Convincing, And Charismatic?

In this book, Steve Cohen, master magician and star of the long-running Chamber Magic show in New York City, will reveal the secrets of all great showmen and magicians—how to persuade, influence, and charm, and ultimately accomplish the things you've...

Handbook of Ambient Intelligence and Smart Environments
Handbook of Ambient Intelligence and Smart Environments

Ambient Intelligence (AmI) has recently been adopted as a term referring to a multidisciplinary subject which embraces a variety of pre-existing fields of computer science and engineering. Given the diversity of potential applications this relationship naturally extends to other areas of science, such as education, health and social care,...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy