- Save 15% each on Qualifying items offered by Lana shop ‘We deliver in 4 working days’ when you purchase 2 or more. Here's how (restrictions apply)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Enterprise Security with EJB and CORBA(r) 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
Special offers and product promotions
From the Back Cover
"Leveraging their strong implemention and standards committee experience, the authors have delivered the definitive guide to enterprise distributed object security."
—Wing K. Lee, Sprint, Enterprise Security with EJB and CORBA
With e-business and distributed components comes the need for a bold new approach to security solutions. Setting out to resolve the security challenges of today's networked world, this book shows developers how to harness the power of EJB and CORBA to secure each and every system level—from Web browsers to mid-tier components to legacy systems.
You'll get real-world techniques for building secure applications using EJB and CORBA components and learn about existing and emerging technologies, architectures, and implementations, including how to choose the right ones for your specific needs.
You'll also find an e-commerce example that will help you understand the various topics discussed, including:
- Security technologies, from Web security to mid-tier and database security
- Interoperability of cross-domain components, and how to modify architectures for security
- Interoperability of EJB and CORBA components, and how to make them work together securely
- How to protect applications using the RAD architecture
- Using rights, attributes, domains, and delegation
- The companion Web site contains:
- The code for the e-commerce example in the book
- Additional examples and product information
About the Author
BRET HARTMAN, nationally recognized expert on CORBA security, is Chief Technology Officer of the Hitachi Security Software Unit. He is a regular speaker and expert panelist on secure distributed systems and CORBA security.
DONALD J. FLINN is a security architect at Iona Technologies with over 25 years' experience in distributed object systems, including CORBA and Java security. He is chair of the Security SIG at the Object Management Group.
KONSTANTIN BEZNOSOV, PhD, is a Security Architect at Concept Five Technologies. As a coauthor of security-related CORBA standards and a former cochair of OMG's Security SIG, he has written widely on architectural issues of engineering secure enterprises.
Browse award-winning titles. See more
If you are a seller for this product, would you like to suggest updates through seller support?
Top Customer Reviews
On the downside there are several minuses which will hopefully be corrected in a future edition
1. The UML diagrams are incorrect, in that they nearly all have the aggregation symbol at the wrong end
2. The fact that the book was written by several authors shows, in that the same idea shows up in several places in the book, without correlation. Not that there's anything contradictory about that. It would be nice if the different "definitions" or explanations were somehow collected in one place. For example, there's two discussions of security servers, with neither one aware of the other. The second discussion (p. 331-332) is not even referenced in the index.
3. There's very little discussion of performance issues. This is a particular sore point, considering they spend considerable amount of space discussing (even promoting) EJB security with no mention of its downside (its too slow)
All in all, though, I highly recommend this book be read by architects, and app developers as well as product managers before diving into security development for your application
It is kind of unique book which gives not just authentication, network security or protocols, but the security of application-server based solution.
It is a reality that modern enterprise application runs in a sort of application server - be it .NET, J2EE or CORBA-based. It implies quite different approach to the security aspects, comparing to stand-alone application. And this book completely covers this aspect. It contains little source code, but in the security world the less you code the more you secure.
One of minus is lack of .NET security and integration with J2EE security... may be this will be next book?
I would recommend this book to software architects, project managers and professionals working on enterprise systems integration.