Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing Java: Getting Down to Business with Mobile Code, 2nd Edition

Buy
Information Security/Java "This book is mandatory reading for every user and developer of Webware." —Peter G. Neumann, Moderator of the Risks Forum, from his review of the first edition Securing Java Java security is more important now than ever before. As Java matures and moves into the enterprise, security takes a more prominent role. But as Java evolves, its security issues and architectures get more complicated. Written by the world’s leading experts on mobile code security, this updated and expanded edition of the groundbreaking guide to Java security includes lessons for Web users, developers, system administrators, and business decision-makers alike. This book navigates the uncharted waters of mobile code security and arms the reader with the knowledge required for securing Java. It provides in-depth coverage of:
  • The base Java security sandbox, made up of the Verifier, Class Loaders, and the Security Manager
  • Code signing, stack inspection, and the new Java 2 security architecture
  • The pros and cons of language-based enforcement models and trust models
  • All known Java security holes and the attack applets that exploit them
  • Techniques commonly used in malicious applets
  • Twelve rules for developing more secure Java code, with explicit examples
  • Hard questions to ask third-party Java security tools vendors
  • Analysis of competing systems for mobile code, including ActiveX and JavaScript
  • Card Java security, smart card risks, and their impact on e-commerce security
On the companion Web site www.securingjava.com you’ll find:
  • The Java Security Hotlist: Over 100 categorized and annotated Java security-related Web links
  • An e-mail list to keep subscribers abreast of breaking Java security news
  • A complete electronic edition of this book
About the Author

GARY McGRAW is Vice President and Senior Research Scientist with Reliable Software Technologies and an international authority on Java security. Dr. McGraw is the author of over 50 peer-reviewed technical publications, consults with major e-commerce vendors including Visa, and is the principal investigator on several U.S. government research grants. EDWARD W. FELTEN is Professor of Computer Science at Princeton University where he leads the world-renowned Secure Internet Programming team. Professor Felten discovered many of Java’s security holes and is actively involved in designing more secure approaches to mobile code.
(HTML tags aren't allowed.)

Dog Behaviour, Evolution, and Cognition (Oxford Biology)
Dog Behaviour, Evolution, and Cognition (Oxford Biology)

This is the first book to collate and synthesise the recent burgeoning primary research literature on dog behaviour, evolution and cognition. The author presents a new ecological approach to the understanding of dog behaviour, demonstrating how dogs can be the subject of rigorous and productive scientific study without the need to confine...

Volcano & Earthquake (DK Eyewitness Books)
Volcano & Earthquake (DK Eyewitness Books)

The most trusted nonfiction series on the market, Eyewitness Books provide an in-depth, comprehensive look at their subjects with a unique integration of words and pictures.

DK's classic look at volcanoes and earthquakes, now reissued with a CD and wall chart.

Volcanoes and earthquakes are nature...

Enterprise Mac Security: Mac OS X Snow Leopard (Foundations)
Enterprise Mac Security: Mac OS X Snow Leopard (Foundations)

A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats.

Enterprise Mac...


SharePoint 2010 Web Parts in Action
SharePoint 2010 Web Parts in Action

I really love working with SharePoint! I’ve been doing it full-time for the last half decade, including lots of late nights and weekends. One area that I’ve found particularly interesting is Web Parts. I like the nature of a Web Part since it can act as a standalone application inside the powerful SharePoint platform—or it...

Command Line Fundamentals: Learn to use the Unix command-line tools and Bash shell scripting
Command Line Fundamentals: Learn to use the Unix command-line tools and Bash shell scripting

Master shell basics and Unix tools and discover easy commands to perform complex tasks with speed

Key Features

  • Learn why the Bash shell is widely used on Linux and iOS
  • Explore advanced shell concepts, such as pipes and redirection
  • Understand how to use...
Genetics For Dummies (Math & Science)
Genetics For Dummies (Math & Science)
Reveals the connections between genetics and specific diseases

Understand the science and the ethics behind genetics

Want to know more about genetics? This non-intimidating guide gets you up to speed on all the fundamentals. From dominant and recessive inherited traits to the DNA double-helix, you get clear explanations in...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy