|
Java's most striking claim is that it provides a secure programming environment. However, despite lots of discussion, few people understand precisely what Java's claims mean and how it backs up those claims. Java Security is an in-depth exploration aimed at developers, network administrators, and anyone who needs to work with or understand Java's security mechanisms. It discusses in detail what security does and doesn't mean, what Java's default security policies are, and how to create and implement your own policies.In doing so, Java Security provides detailed coverage of security managers, class loaders, the access controller, and much of the java.security package. It discusses message digests, certificates, and digital signatures, showing you how to use Java's facilities for signing classes or to implement your own signature facility. It shows you how to write a class loader that recognizes signed classes, verifies the signature, and cooperates with a security manager to grant additional privileges. It also discusses the problem of managing cryptographic keys and shows you how to implement your own key management systems.Java Security is an essential book for everyone using Java in real-world software. If you're deploying software written in Java, you need to know how to grant your classes the privileges they need, without granting privileges to untrusted classes. You need to know how to protect your systems against intrusion and corruption. Java provides the tools; this book shows you how to use them. |
|
|
Computation Engineering: Applied Automata Theory and LogicThe computer hardware and software industry is committed to using formal methods. As a result, it is crucial that students who take automata theory and logic courses retain what they have learned and understand how to use their knowledge. Yet many textbooks typically emphasize automata theory only, not logic, thus losing a valuable opportunity... | | Blitzkrieg: From the Ground Up
An examination of the German Blitzkrieg operations from Poland to Operation Barbarossa, as experienced by junior commanders and enlisted men, exploring why they were so successful.
The successes of the German Blitzkrieg in 1939–41 were as surprising as they were swift. Allied... | | Pro .NET 1.1 Remoting, Reflection, and ThreadingWhen reading the title of this book, you might ask yourself “Why did they put remoting, reflection, and threading together in one book?” The answer might not seem obvious at first, but after reading this introduction you should understand why these three technologies belong in a developer’s toolkit and in a ... |
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
The world's bestselling computer security book--fully expanded and updated
"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,... | | Introduction to Networking Basics
Today’s students have different goals, different life experiences, and different
academic backgrounds, but they are all on the same path to success in
the real world. This diversity, coupled with the reality that these learners
often have jobs, families, and other commitments, requires a fl exibility that
our... | | Corporate Information Strategy and Management
"Corporate Information Strategy and Management: Text and Cases 8/e" by Applegate, Austin, and Soule is written for students and managers who desire an overview of contemporary information systems technology management. This new edition examines how information technology (IT) enables organizations to conduct business in radically... |
|