Tuesday, February 17, 2009

Securing Java: Getting Down to Business with Mobile Code, 2nd Edition


Information Security/Java "This book is mandatory reading for every user and developer of Webware." -Peter G. Neumann, Moderator of the Risks Forum, from his review of the first edition Securing Java Java security is more important now than ever before. As Java matures and moves into the enterprise, security takes a more prominent role. But as Java evolves, its security issues and architectures get more complicated. Written by the world's leading experts on mobile code security, this updated and expanded edition of the groundbreaking guide to Java security includes lessons for Web users, developers, system administrators, and business decision-makers alike. This book navigates the uncharted waters of mobile code security and arms the reader with the knowledge required for securing Java. It provides in-depth coverage of:
* The base Java security sandbox, made up of the Verifier, Class Loaders, and the Security Manager
* Code signing, stack inspection, and the new Java 2 security architecture
* The pros and cons of language-based enforcement models and trust models
* All known Java security holes and the attack applets that exploit them
* Techniques commonly used in malicious applets
* Twelve rules for developing more secure Java code, with explicit examples
* Hard questions to ask third-party Java security tools vendors
* Analysis of competing systems for mobile code, including ActiveX and JavaScript
* Card Java security, smart card risks, and their impact on e-commerce security
On the companion Web site www.securingjava.com you'll find:
* The Java Security Hotlist: Over 100 categorized and annotated Java security-related Web links
* An e-mail list to keep subscribers abreast of breaking Java security news
* A complete electronic edition of this book

Download:
Link_1
Or
Link_2
.

0 comments:

Post a Comment | Feed

Post a Comment



Related Posts with Thumbnails
 

Blog Archive

Recent Posts

  © Free E-Books U ask v provide by Free E-Books Download 2012

Disclaimer: This blog does not store any files on its server.We only index and link to content provided by sites.

USER AGREEMENT PLEASE READ : The creator of THIS PAGE or the ISP(s) hosting any content on this site take NO responsibility for the way you use the information provided on this site. These links here are for educational purposes only and SHOULD BE VIEWED ONLY. If you download any files to view them, you are agreeing to delete them within a 24 hour period. If you are affiliated with any government, or ANTI-Piracy group or any other related group or were formally a worker of one you CANNOT enter this web site, cannot access any of its files and you cannot view any of the HTML files. All the objects on this site are PRIVATE property and are meant for previewing only. If you enter this site without following these agreements you are not agreeing to these terms and you are violating code 431.322.12 of the Internet Privacy Act signed by Bill Clinton in 1995 and that means that you CANNOT threaten our ISP(s) or any person(s) or company storing these files, cannot prosecute any person(s) affiliated with this page which includes family, friends or individuals who run or enter this web site. If you want to remove links to your website, Please send an email to professionalstudents[at]gmail[dot]com.