- Регистрация
- 27 Авг 2018
- Сообщения
- 37,233
- Реакции
- 523,716
- Тема Автор Вы автор данного материала? |
- #1
This book provides the complete insiders guide to securing Java 2 enterprise applications, with comprehensive coverage of the new Java 2 security models. Designed to help you integrate Java 2 into your enterprise security strategies.
The purpose of this book is to answer those questions, from the point of view of people who want to use Java, but want to do so reliably, securely and safely. That makes this book different from much recent writing on Java, which focuses, perfectly legitimately, on how a Java system can be broken into and how to avoid those dangers. On the contrary, this book focuses on how Java can be made secure and how to exploit its strengths. The goal is to provide practical help to the various groups involved in making a Java-based application or Web site into an industrial-strength commercial proposition.
- Building secure enterprise applications with Java 2!
- Integrating Java 2 into your overall security strategy
- Detailed coverage for managers, developers, netadmins, and security specialists
- Comprehensive coverage of the new Java 2 security model
- Integrate Java 2 into your enterprise security strategies
- Master Java's powerful Cryptography APIs
- Marco Pistoia, Ph.D. has worked for IBM Corporation since January 1996 and is currently a Senior Manager and Distinguished Research Staff Member at the IBM Thomas J. Watson Research Center in New York, where he manages the Mobile Enterprise Software research group.
- Dr. Pistoia has designed and implemented numerous analysis components and contributed large amounts of code to IBM's two main products for static quality analysis: IBM Rational Software Analyzer and IBM Security AppScan Source.
DOWNLOAD: