Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Cambridge ; : O'Reilly,
    UID:
    (DE-602)edocfu_9961556642902883
    Format: 1 online resource (xv, 454 pages) , illustrations. ;
    Edition: First edition.
    ISBN: 0-585-02698-X
    Series Statement: The Java series.
    Content: Java's most striking claim is that it provides a secure programming environment. However, despite lots of discussion, few people understand precisely what Java's claims mean and how it backs up those claims. Java Security is an in-depth exploration aimed at developers, network administrators, and anyone who needs to work with or understand Java's security mechanisms. It discusses in detail what security does and doesn't mean, what Java's default security policies are, and how to create and implement your own policies. In doing so, Java Security provides detailed coverage of security managers, class loaders, the access controller, and much of the java.security package. It discusses message digests, certificates, and digital signatures, showing you how to use Java's facilities for signing classes or to implement your own signature facility. It shows you how to write a class loader that recognizes signed classes, verifies the signature, and cooperates with a security manager to grant additional privileges. It also discusses the problem of managing cryptographic keys and shows you how to implement your own key management systems. Java Security is an essential book for everyone using Java in real-world software. If you're deploying software written in Java, you need to know how to grant your classes the privileges they need, without granting privileges to untrusted classes. You need to know how to protect your systems against intrusion and corruption. Java provides the tools; this book shows you how to use them.
    Note: Bibliographic Level Mode of Issuance: Monograph , Java Application Security -- , What Is Security? -- , The Java Sandbox -- , Security Debugging -- , The Default Sandbox -- , Elements of the Java Sandbox -- , Keystores -- , Code Sources -- , Policy Files -- , The Default Sandbox -- , The java.security File -- , Comparison with Previous Releases -- , Java Language Security -- , Java Language Security Constructs -- , Enforcement of the Java Language Rules -- , Comparisons with Previous Releases -- , The Security Manager -- , Overview of the Security Manager -- , Operating on the Security Manager -- , Methods of the Security Manager -- , Comparison with Previous Releases -- , The Access Controller -- , The CodeSource Class -- , The Policy Class -- , Protection Domains -- , The AccessController Class -- , Guarded Objects -- , Comparison with Previous Releases -- , Java Class Loaders -- , The Class Loader and Namespaces -- , Class Loading Architecture -- , Implementing a Class Loader -- , Miscellaneous Class Loading Topics -- , Comparison with Previous Releases -- , Introduction to Cryptography -- , The Need for Authentication -- , The Role of Authentication -- , Cryptographic Engines -- , Security Providers -- , The Architecture of Security Providers -- , The Provider Class -- , The Security Class -- , The Architecture of Engine Classes -- , Comparison with Previous Releases -- , Keys and Certificates -- , Keys -- , Generating Keys -- , Key Factories -- , Certificates -- , Keys, Certificates, and Object Serialization -- , Comparison with Previous Releases -- , Key Management -- , Key Management Terms -- , The keytool -- , The Key Management API -- , A Key Management Example. , Available also in a print edition. , English
    Additional Edition: ISBN 1-56592-403-7
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages