Acheter d'occasion
EUR 2,19
+ EUR 2,99 (livraison)
D'occasion: Très bon | Détails
Vendu par worldofbooksfr
État: D'occasion: Très bon
Commentaire: The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Vous l'avez déjà ? Vendez sur Amazon
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir cette image

Securing Java: Getting Down to Business with Mobile Code (Anglais) Broché – 16 février 1999


Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Broché
EUR 57,00 EUR 2,19
click to open popover

Offres spéciales et liens associés


Description du produit

Présentation de l'éditeur

Information Security/Java "This book is mandatory reading for every user and developer of Webware." –Peter G. Neumann, Moderator of the Risks Forum, from his review of the first edition Securing Java Java security is more important now than ever before. As Java matures and moves into the enterprise, security takes a more prominent role. But as Java evolves, its security issues and architectures get more complicated. Written by the world′s leading experts on mobile code security, this updated and expanded edition of the groundbreaking guide to Java security includes lessons for Web users, developers, system administrators, and business decision–makers alike. This book navigates the uncharted waters of mobile code security and arms the reader with the knowledge required for securing Java. It provides in–depth coverage of:
∗ The base Java security sandbox, made up of the Verifier, Class Loaders, and the Security Manager
∗ Code signing, stack inspection, and the new Java 2 security architecture
∗ The pros and cons of language–based enforcement models and trust models
∗ All known Java security holes and the attack applets that exploit them
∗ Techniques commonly used in malicious applets
∗ Twelve rules for developing more secure Java code, with explicit examples
∗ Hard questions to ask third–party Java security tools vendors
∗ Analysis of competing systems for mobile code, including ActiveX and JavaScript
∗ Card Java security, smart card risks, and their impact on e–commerce security
On the companion Web site www.securingjava.com you′ll find:
∗ The Java Security Hotlist: Over 100 categorized and annotated Java security–related Web links
∗ An e–mail list to keep subscribers abreast of breaking Java security news
∗ A complete electronic edition of this book

Quatrième de couverture

Information Security/Java "This book is mandatory reading for every user and developer of Webware." –Peter G. Neumann, Moderator of the Risks Forum, from his review of the first edition Securing Java Java security is more important now than ever before. As Java matures and moves into the enterprise, security takes a more prominent role. But as Java evolves, its security issues and architectures get more complicated. Written by the world′s leading experts on mobile code security, this updated and expanded edition of the groundbreaking guide to Java security includes lessons for Web users, developers, system administrators, and business decision–makers alike. This book navigates the uncharted waters of mobile code security and arms the reader with the knowledge required for securing Java. It provides in–depth coverage of:
∗ The base Java security sandbox, made up of the Verifier, Class Loaders, and the Security Manager
∗ Code signing, stack inspection, and the new Java 2 security architecture
∗ The pros and cons of language–based enforcement models and trust models
∗ All known Java security holes and the attack applets that exploit them
∗ Techniques commonly used in malicious applets
∗ Twelve rules for developing more secure Java code, with explicit examples
∗ Hard questions to ask third–party Java security tools vendors
∗ Analysis of competing systems for mobile code, including ActiveX and JavaScript
∗ Card Java security, smart card risks, and their impact on e–commerce security
On the companion Web site www.securingjava.com you′ll find:
∗ The Java Security Hotlist: Over 100 categorized and annotated Java security–related Web links
∗ An e–mail list to keep subscribers abreast of breaking Java security news
∗ A complete electronic edition of this book

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.



Détails sur le produit


Commentaires client

Il n'y a pour l'instant aucun commentaire client.
Partagez votre opinion avec les autres clients

Commentaires client les plus utiles sur Amazon.com

Amazon.com: 3,8 sur 5 étoiles 5 commentaires
Sudipto K. Haldar
4,0 sur 5 étoilesgood information base for beginners/intermediates
17 novembre 2003 - Publié sur Amazon.com
Une personne a trouvé cela utile.
5,0 sur 5 étoilesExcellent book on Java Security
23 février 1999 - Publié sur Amazon.com
Une personne a trouvé cela utile.
5,0 sur 5 étoilesExcellent conceptual overview
29 avril 1999 - Publié sur Amazon.com
2,0 sur 5 étoilesnot better than Java online tutorial
13 mai 1999 - Publié sur Amazon.com
9 personnes ont trouvé cela utile.

Où en sont vos commandes ?

Livraison et retours

Besoin d'aide ?