eBooks-it.org Logo
eBooks-IT.org Inner Image

Enterprise Java Security

Building Secure J2EE Applications

Enterprise Java Security Image

Book Details:

Publisher:Addison-Wesley Professional
Series: Addison Wesley
Author:Marco Pistoia
Edition:1
ISBN-10:0321118898
ISBN-13:9780321118899
Pages:608
Published:Feb 27 2004
Posted:Nov 19 2014
Language:English
Book format:CHM
Book size:3.91 MB

Book Description:

Enterprise Java Security: Building Secure J2EE Applications provides application developers and programmers with the know-how they need to utilize the latest Java security technologies in building secure enterprise infrastructures. Written by the leading Java security experts at IBM, this comprehensive guide covers the current status of the Java 2 Platform, Enterprise Edition (J2EE), and Java 2 Platform, Standard Edition (J2SE), security architectures and offers practical solutions and usage patterns to address the challenges of Java security. To aid developers who need to build secure J2EE applications, Enterprise Java Security covers at length the J2EE security technologies, including the security aspects of servlets, JavaServer Pages(TM) (JSP), and Enterprise JavaBeans (EJB)-technologies that are at the core of the J2EE architecture. In addition, the book covers Web Services security. Examples and sample code are provided throughout the book to give readers a solid understanding of the underlying technology. The relationship between Java and cryptographic technologies is covered in great detail, including: Java Cryptography Architecture (JCA) Java Cryptography Extension (JCE) Public-Key Cryptography Standards (PKCS) Secure/Multipurpose Internet Mail Extensions (S/MIME) Java Secure Socket Extension (JSSE)

Download Link:

Related Books:

Embedded Java Security

Security for Mobile Devices
Embedded Java Security Image
This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. No other book specifically addresses the topic of embedded Java security. Furthermore, the book provides hints and suggestions as ways for hardening security, and offers researchers and practitioners alike a broader and deeper understanding of the issues involved in embedded Java security, and as a larger view - mobile devices security. The author is a well-known authority and expert in mobile computing and embedded devices....

Enterprise Mac Security

Mac OS X Snow Leopard
Enterprise Mac Security Image
2nd Edition
A common misconception in the Mac community is that Macs operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats. Enterprise Mac Security: Mac OS X Snow Leopard is a definitive, expert-driven update of the popular, slash-dotted first edition and was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing systems, including the new Snow Leopard operating system. Usi...

Developing Enterprise Java Applications with J2EE and UML

Developing Enterprise Java Applications with J2EE and UML Image
The Java 2 Platform Enterprise Edition (J2EE TM) offers great promise for dramatically improving the way that enterprise applications are built, and organizations that have adopted the J2EE are gaining a competitive advantage. The industry-standard Unified Modeling Language (UML) has helped countless organizations achieve software success through visual modeling. Together, the UML and J2EE form a powerful set of tools, but the intricacies involved with using them in tandem are considerable. While UML is highly effective for specifying, designing, constructing, visualizing, and documenting software systems, J2EE offers enterprise developers a simplified, component-based approach to application development. However, when using the two technologies to...



2007 - 2021 © eBooks-IT.org