Written in the same exciting and informative style as the international blockbuster Hacking Exposed, this book provides comprehensive coverage of the tools and techniques for testing and correcting J2EE and Java security issues. Includes examples of J2EE attacks and countermeasures, risk ratings throughout the chapters and case studies.
Written in the same exciting and informative style as the international blockbuster Hacking Exposed, this book provides comprehensive coverage of the tools and techniques for testing and correcting J2EE and Java security issues. Includes examples of J2EE attacks and countermeasures, risk ratings throughout the chapters and case studies.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Art Taylor has a masters degree in Information Technology and over 17 years experience in the computer industry. The majority of that experience was spent developing database applications for relational databases where security of business information assets was always an important concern. He has worked with Java since its inception, authoring one of the first technical books on the JDBC API, the "JDBC Developer's Resource" for Prentice Hall and authoring several other Java books since then. He has worked on a number of Web development projects using Java and has spent the last year teaching Java courses for Sun Microsystems. He is a Sun certified Java programmer and instructor.
Inhaltsangabe
Part I: J2EE Architecture and Technology Introduction 1: The Java Basics: Security from the Ground Up 2: Introduction to JAAS, JCE, and JSSE 3: J2EE Architecture and Security Part II: Java Application and Network Security 4: Using Encryption and Authentication to Protect an Application 5: Software Piracy and Code Licensing Schemes 6: The Exposure of Bytecodes 7: Hacking Java Client-Server Applications: Another Tier to Attack 8: Java Network Applications: Potential Security Flaw Attacks Part III: J2EE Security on the Web and Business Tiers 9: This is .WAR: Exploiting Java Web Tier Components 10: Shaking the Foundation: Web Container Strengths and Weaknesses 11: Java Web Services Security 12: Enterprise Java Beans: Security for the Business Tier
Part I: J2EE Architecture and Technology Introduction 1: The Java Basics: Security from the Ground Up 2: Introduction to JAAS, JCE, and JSSE 3: J2EE Architecture and Security Part II: Java Application and Network Security 4: Using Encryption and Authentication to Protect an Application 5: Software Piracy and Code Licensing Schemes 6: The Exposure of Bytecodes 7: Hacking Java Client-Server Applications: Another Tier to Attack 8: Java Network Applications: Potential Security Flaw Attacks Part III: J2EE Security on the Web and Business Tiers 9: This is .WAR: Exploiting Java Web Tier Components 10: Shaking the Foundation: Web Container Strengths and Weaknesses 11: Java Web Services Security 12: Enterprise Java Beans: Security for the Business Tier
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826