Helton | Java Security Solutions | Buch | 978-0-7645-4928-1 | www2.sack.de

Buch, Englisch, 700 Seiten, Format (B × H): 191 mm x 235 mm, Gewicht: 1320 g

Helton

Java Security Solutions


1. Auflage 2002
ISBN: 978-0-7645-4928-1
Verlag: WILEY

Buch, Englisch, 700 Seiten, Format (B × H): 191 mm x 235 mm, Gewicht: 1320 g

ISBN: 978-0-7645-4928-1
Verlag: WILEY


* Provides practical solutions, not just principles of security.
* Offers an in depth toolkit to the reader and explains how to use the tools to build a secure system.
* Introduces concepts of security patterns for designing systems, as well as security building blocks for systems.
* Discusses algorithms, cryptography and architecture.
* Addresse security for different application servers.

Helton Java Security Solutions jetzt bestellen!

Weitere Infos & Material


Preface.
Acknowledgments.

Part I: Introduction to Security.

Chapter 1: Security Basics.

Chapter 2: Hackers and Their Tools.

Chapter 3: Java Security Components.

Part II: Identity and Authentication.

Chapter 4: Key Management Algorithms.

Chapter 5: Elliptic Curve Cryptography.

Chapter 6: Key Management Through the Internet Protocol.

Chapter 7: Implementing Keys with Java.

Chapter 8: Java Implementation of Key Management.

Part III: Data Integrity.

Chapter 9: Ensuring Data Integrity.

Chapter 10: Ensuring Message Authentication.

Chapter 11: Signature Integrity.

Part IV: Data Hiding.

Chapter 12: Understanding Ciphers.

Chapter 13: Extending New Ciphers with the JDK.

Chapter 14: Applying Ciphers.

Part V: Resource Access Using Java.

Chapter 15: Securing Enterprise Resources.

Chapter 16: Java Authentication and Authorization Through Kerberos.

Chapter 17: Securing Messages with the Java GSS-API.

Chapter 18: Java Access: The Security Manager.

Chapter 19: Java Authentication and Authorization Service.

Part VI: Enterprise Data Security.

Chapter 20: Working with Database Security.

Part VII: Network Access.

Chapter 21: Network Security Architecture.

Chapter 22: SSL and TLS.

Chapter 23: Java Secure Socket Extension.

Part VIII: Public Key Management.

Chapter 24: Java Digital Certificates.

Chapter 25: PKI Management.

Part IX: Enterprise Access.

Chapter 26: Java Enterprise Security and Web Services Security.

Chapter 27: Securing Client-Side Components.

Chapter 28: Securing Server-Side Components.

Chapter 29: Application Security with Java.

Index


Rich Helton has more than two decades of experience in computer and security systems. For the last twelve years, he has built secure NFS, Internet, and intranet systems as well as monitoring software for a wide variety of companies. He has served as lead Java architect specializing in security in such industries as brokerage, financial, telecommunications, and logistics. He is a certified Sun Java Developer, Sun Java Programmer, and BEA WebLogic 6.0 Developer, and he holds a masters degree in com-puter science from the University of Colorado. He contributed to BEA WebLogic Server Bible (Wiley, 2002).
Johennie Helton has nearly a decade of experience in object-oriented design and implementation for the automotive, financial, healthcare, and retail industries. She has a masters degree in computer science from the University of Colorado. She contributed chapters to Java Data Access: JDBC, JNDI, and JAXP (Wiley, 2002).



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.