2020ok  Directory of FREE Online Books and FREE eBooks

Free eBooks > Computers & Internet > Certification Central > Exams > Java > Java 2 Network Security

Java 2 Network Security

by Marco Pistoia


Download Book
(Respecting the intellectual property of others is utmost important to us, we make every effort to make sure we only link to legitimate sites, such as those sites owned by authors and publishers. If you have any questions about these links, please contact us.)


link 1



About Book

Book Description

Learn how to use Java reliably, securely, and safely! Unlike other books, which focus on how Java can be broken, this one focuses on delivering practical help with Java security to everyone involved in building and deploying industrial-strength Java-based applications. Now that Java is "leaving the sandbox," you need stronger security than ever, and Java 2 Network Security, Second Edition shows you how to get it. One of the first books to cover the new Java 2 network security model that has been written in full cooperation with Sun's own developers, it compares the pros and cons of every leading approach to Java security. You'll review specific techniques for deploying or limiting Java across corporate firewalls; discover how to integrate Java and SSL; master Java's powerful Cryptography APIs; and learn how to architect your applications to improve their inherent security. The accompanying CD-ROM contains all programs included in the book, plus shareware designed to help readers develop more secure Java programs and more thoroughly understand the new Java 2 security model.



Book Info
Provides the complete insiders guide to securing Java 2 enterprise applications, with comprehensive coverage of the new Java 2 security models. Designed to help you integrate Java 2 into your enterprise security strategies. Softcover. 3 1/2 inch disk included.

Card catalog description
"Written in cooperation with Sun's own developers, Java 2 Network Security, Second Edition presents systematic coverage of the new Java 2 network security model for managers, network administrators, developers, and security professionals alike. You'll learn the real-world pros and cons of each leading Java security alternative; architectural techniques for maximizing security; and how to integrate Java security into your enterprise-wide security strategies."--BOOK JACKET.

From the Inside Flap
Preface

Java is fashionable, but is it reliable? Java is entertaining, but is it secure? Java is useful, but is it safe?

The purpose of this book is to answer those questions, from the point of view of people who want to use Java, but want to do so reliably, securely and safely. That makes this book different from much recent writing on Java, which focuses, perfectly legitimately, on how a Java system can be broken into and how to avoid those dangers. On the contrary, this book focuses on how Java can be made secure and how to exploit its strengths. The goal is to provide practical help to the various groups involved in making a Java-based application or Web site into an industrial-strength commercial proposition.

Various groups have different needs and different skills, which this book meets in its different parts.

The first part is aimed at the intelligent non-specialist who oversees system management or application development, or incorporates Java into the security policy. Only a basic understanding of computers and a limited exposure to Java is assumed, but all the themes of Java security are introduced in a context that stresses over and over again how Java security must be seen as an integral part of system security.

The second part goes into more detail on how Java security works, and is aimed more at system and network administrators and programmers, who need to know more of what is going on.

The third part looks at the broader context in which Java operates, including some extensions to Java security and some aspects of its future.

This book explains the evolution of the Java security model, and then focuses on the Java 2 security architecture and its revolutionary domains of protection. It offers a very large number of examples to give you a better understanding of the technology involved.The Team That Wrote This Redbook

This redbook was produced by a team of specialists from around the world working at the International Technical Support Organization Raleigh Center.The leader of this project was Marco Pistoia.

Marco Pistoia is a Network Security Specialist, working as a project leader at the International Technical Support Organization, Raleigh Center. He writes extensively and teaches IBM classes worldwide on all areas of the e-business Application Framework, WebSphere, Java and Internet security. Marco holds a degree with honors in Pure Mathematics from the University of Rome and a masters degree in Computer Science. Before joining the ITSO, he was a System Engineer in IBM Italy. He received an Outstanding Technical Achievement Award in 1996.

Duane F. Reller is a Senior Software Engineer in the System/390 Programming Laboratory in Endicott, New York, USA. He has 25 years of experience in System/390 Hardware and Software development. He has served in technical and management positions. He holds a Bachelor's degree in Electrical Technology and a Master of Science degree in Computer Science from the State University of New York at Binghamton. His areas of expertise include Hardware and Software System's Architecture and Management.

Deepak Gupta is a Senior Software Engineer in IBM, India. He has two and a half years of experience in Internet technologies. He holds a degree in Electronics and Communications from the University of Roorkee, India. His areas of expertise include Internet security and Electronic Commerce. Deepak was involved in IBM India's largest e-Commerce project and in India's first secured e-Commerce site allowing Rupee-based transactions, for which he was conferred the Employee of the Month Award. He has also given several talks on Internet security and e-Commerce.

Milind Nagnur is a Senior Associate in the Operations and Systems Risk Management (OSRM) group of Price Waterhouse Coopers in Mumbai, India. He has a couple of years of exposure in Internet technologies, with emphasis on security and control issues in real business applications. He holds a degree in Mechanical Engineering from the Indian Institute of Technology in Bombay, India, and an MBA from the Indian Institute of Management in Calcutta, India.Ashok K. Ramani is a Senior Software Engineer in IBM India. He has two and a half years of experience in Internet technologies. He holds a degree in MSc.(Tech.) Information Systems from the Birla Institute of Technology and Science, Pilani, India. His areas of expertise include Internet security and Electronic Commerce. Ashok was involved in IBM India's largest e-Commerce project and in India's first secure e-Commerce site allowing Rupee-based transactions for which he was conferred the Employee of the Month Award. He has won special recognition awards at IBM India for his contribution to e-Commerce projects. He has also presented several talks on Internet security and e-Commerce.Comments Welcome

Your comments are important to us!

We want our redbooks to be as helpful as possible. Please send us your comments about this or other redbooks in one of the following ways:

Fax the evaluation form found in "ITSO Redbook Evaluation" on page 713 to the fax number shown on the form.

Use the online evaluation form found at redbooks.ibm/

Send your comments in an internet note to redbook@us.ibm

From the Back Cover


1559B-9

The complete insider's guide to securing Java 2 enterprise applications!

  • Building secure enterprise applications with Java 2!
  • Integrating Java 2 into your overall security strategy
  • Detailed coverage for managers, developers, netadmins, and security specialists
  • Comprehensive coverage of the new Java 2 security model
  • Integrate Java 2 into your enterprise security strategies
  • Master Java's powerful Cryptography APIs

Now that Java is "leaving the sandbox," you need stronger security than ever, and Java 2 Network Security, Second Edition shows you how to get it. Unlike other books, which focus on how Java can be broken, this one delivers practical help with Java 2 security to everyone involved in building and deploying industrial-strength Java-based applications.

Written in cooperation with Sun's own developers, Java 2 Network Security, Second Edition presents systematic coverage of the new Java 2 network security model for managers, network administrators, developers, and security professionals alike. You'll learn the real-world pros and cons of each leading Java security alternative; architectural techniques for maximizing security; and how to integrate Java security into your enterprise-wide security strategies.

You'll discover practical techniques for securing Web and intranet applications, deploying or limiting Java across corporate firewalls; integrating Java and SSL, leveraging Java's powerful Cryptography APIs, and much more. Java 2 Network Security, Second Edition is up-to-date, authoritative, and thorough-and if you're using Java in enterprise development, it's utterly essential.

Sharing Technical Expertise from Around the World This book and other IBM Redbooks are products of IBM's International Technical Support Organization, where worldwide specialists work alongside you to harness IBM technologies. IBM Redbooks make the answers to your most pressing technical questions easily and immediately accessible.

For more information: http://www.redbooks.ibm.com/redbooks

  • Securing mission-critical Java applications: real-world techniques that work
  • Detailed coverage of the new Java 2 security model



About the Author

The Team That Wrote This Redbook

This redbook was produced by a team of specialists from around the world working at the International Technical Support Organization Raleigh Center.

The leader of this project was Marco Pistoia.

Marco Pistoia is a Network Security Specialist, working as a project leader at the International Technical Support Organization, Raleigh Center. He writes extensively and teaches IBM classes worldwide on all areas of the e-business Application Framework, WebSphere, Java and Internet security. Marco holds a degree with honors in Pure Mathematics from the University of Rome and a masters degree in Computer Science. Before joining the ITSO, he was a System Engineer in IBM Italy. He received an Outstanding Technical Achievement Award in 1996.

Duane F. Reller is a Senior Software Engineer in the System/390 Programming Laboratory in Endicott, New York, USA. He has 25 years of experience in System/390 Hardware and Software development. He holds a Bachelor's degree in Electrical Technology and a Master of Science degree in Computer Science from the State University of New York at Binghamton. His areas of expertise include Hardware and Software System's Architecture and Management.

Deepak Gupta is a Senior Software Engineer in IBM, India. He has two and a half years of experience in Internet technologies. He holds a degree in Electronics and Communications from the University of Roorkee, India. His areas of expertise include Internet security and Electronic Commerce. Deepak was involved in IBM India's largest e-Commerce project and in India's first secured e-Commerce site allowing Rupee-based transactions, for which he was conferred the Employee of the Month Award. He has also given several talks on Internet security and e-Commerce.

Milind Nagnur is a Senior Associate in the Operations and Systems Risk Management (OSRM) group of Price Waterhouse Coopers in Mumbia, India. He has a couple of years exposure in Internet technologies, with emphasis on security and control issues in real business applications. He holds a degree in Mechanical Engineering from the Indian Institute in Bombay, India, and an MBA from the Indian Institute of Management in Calcutta, India.

Ashok K. Ramani is a Senior Software Engineer in IBM India. He has two and a half years experience in Internet technologies. He holds a degree in MSc.(Tech) Information Systems from the Birla Institute of Technology and Science, Pilani, India. His areas of expertise include Internet security and Electronic Commerce. Ashok was involved in IBM India's largest e-Commerce project and India's first secure e-Commerce site allowing Rupee-based transactions for which he was conferred the Employee of the Month Award. He has won special recognition awards at IBM India for his contribution to e-Commerce projects. He has also presented several talks on Internet security and e-Commerce.

Thanks to the following people for their invaluable contributions to this project:

Anthony J. Nadalin, Julianne Yarsa, Shirley Fox, Donna Smith Skibbie, Bruce Rich IBM Enterprise Security, Austin Center

Larry Koved IBM, Thomas J. Watson Research, Hawthorne

Li Gong, Jan Luehe, Roland Schemers Sun Microsystems, Inc.

Pat Donleycott, Jorge Ferrari, Martin Murhammer, Gail Christensen, Margaret Ticknor, Shawn Walsh, Linda Robinson, Tate Renner IBM, International Technical Support Organization, Raleigh Center

Rob Macgregor, Dave Durbin, John Owlett, Andrew Yeomans Authors of the first edition

Pete Lawther, Simon Phipps Contributors to the first edition

Comments

SEND A COMMENT

PLEASE READ: All comments must be approved before appearing in the thread; time and space constraints prevent all comments from appearing. We will only approve comments that are directly related to the article, use appropriate language and are not attacking the comments of others.

Message (please, no HTML tags. Web addresses will be hyperlinked):

Related Free eBooks

Related Tags

DIGG This story   Save To Google   Save To Windows Live   Save To Del.icio.us   diigo it   Save To blinklist
Save To Furl   Save To Yahoo! My Web 2.0   Save To Blogmarks   Save To Shadows   Save To stumbleupon   Save To Reddit