JAVA 2 Network Security (2nd Edition)
The Complete Insider's Guide To Securing Java 2 Enterprise Applications!
- Building Secure Enterprise Applications With Java 2!
- Integrating Java 2 Into Your Overall Security Strategy
- Detailed Coverage For Managers, Developers, Netadmins, And Security Specialists
- Comprehensive Coverage Of The New Java 2 Security Model
- Integrate Java 2 Into Your Enterprise Security Strategies
- Master Java's Powerful Cryptography Apis
Now That Java Is Leaving The Sandbox, You Need Stronger Security Than Ever, And Java 2 Network Security, Second Edition Shows You How To Get It. Unlike Other Books, Which Focus On How Java Can Be Broken, This One Delivers Practical Help With Java 2 Security To Everyone Involved In Building And Deploying Industrial-strength Java-based Applications.
Written In Cooperation With Sun's Own Developers, Java 2 Network Security, Second Edition Presents Systematic Coverage Of The New Java 2 Network Security Model For Managers, Network Administrators, Developers, And Security Professionals Alike. You'll Learn The Real-world Pros And Cons Of Each Leading Java Security Alternative; Architectural Techniques For Maximizing Security; And How To Integrate Java Security Into Your Enterprise-wide Security Strategies.
You'll Discover Practical Techniques For Securing Web And Intranet Applications, Deploying Or Limiting Java Across Corporate Firewalls; Integrating Java And Ssl, Leveraging Java's Powerful Cryptography Apis, And Much More. Java 2 Network Security, Second Edition Is Up-to-date, Authoritative, And Thorough-and If You're Using Java In Enterprise Development, It's Utterly Essential.
Sharingtechnical Expertise From Around The World This Book And Other Ibm Redbooks Are Products Of Ibm's International Technical Support Organization, Where Worldwide Specialists Work Alongside You To Harness Ibm Technologies. Ibm Redbooks Make The Answers To Your Most Pressing Technical Questions Easily And Immediately Accessible.
For More Information: ...
booknews
rather Than Focusing On How A Java System Can Be Broken, The Authors Show Managers, Network Administrators, Developers, And Security Professionals How Java Can Be Made Secure And How To Exploit Its Strengths. Topics Include The Pros And Cons Of Each Java Security Alternative; Architectural Techniques For Maximizing Security; Securing Web And Intranet Applications; Deploying Or Limiting Java Across Firewalls; Integrating Java And Ssl; And Using Java's Cryptography Apis. The Disk Contains Source Code And Links To Java Security Web Sites. Annotation C. Book News, Inc., Portland, Or (booknews.com)
Name in long format: | JAVA 2 Network Security (2nd Edition) |
---|---|
ISBN-10: | 0130155926 |
ISBN-13: | 9780130155924 |
Book pages: | 250 |
Book language: | en |
Edition: | Subsequent |
Binding: | Paperback |
Publisher: | Prentice Hall Ptr |
Dimensions: | Height: 9.5 Inches, Length: 7.25 Inches, Weight: 2.45154035344 Pounds, Width: 1.5 Inches |