- Series: Java Series
- Paperback: 620 pages
- Publisher: O'Reilly Media; 2 edition (May 27, 2001)
- Language: English
- ISBN-10: 0596001576
- ISBN-13: 978-0596001575
- Product Dimensions: 7 x 1.2 x 9.2 inches
- Shipping Weight: 2 pounds (View shipping rates and policies)
- Average Customer Review: 21 customer reviews
- Amazon Best Sellers Rank: #1,581,481 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Java Security (2nd Edition) 2nd Edition
Use the Amazon App to scan ISBNs and compare prices.
Fulfillment by Amazon (FBA) is a service we offer sellers that lets them store their products in Amazon's fulfillment centers, and we directly pack, ship, and provide customer service for these products. Something we hope you'll especially enjoy: FBA items qualify for FREE Shipping and Amazon Prime.
If you're a seller, Fulfillment by Amazon can help you increase your sales. We invite you to learn more about Fulfillment by Amazon .
"Rebound" by Kwame Alexander
Don't miss best-selling author Kwame Alexander's "Rebound," a new companion novel to his Newbery Award-winner, "The Crossover,"" illustrated with striking graphic novel panels. Pre-order today
Frequently bought together
Customers who bought this item also bought
Customers who viewed this item also viewed
Scott Oakes' Java Security is extraordinary both for its technical depth and its readability. It provides the Java programmer with a complete overview of the Java security architecture and security classes, plus a wealth of detailed information and code examples for specific implementations. The book opens with a clear discussion of what Java security is, how the various Java sandbox models work, and how Java applications and applets execute within the security model. The following chapters look in depth at the elements of the Java security architecture: language rules, class loaders, the security manager, the access controller, and permission objects. All these chapters provide detailed information on implementation, as well as an excellent explanation of the role of each feature within the entire security picture. The second half of the book covers cryptographic features in the Java security package (much enhanced in Java 1.2) and how Java programs work with code that performs authentication and encryption. Here, you'll find detailed chapters on message digests, keys and certificates, key management, digital signatures, and the Java Cryptography Extensions. Anyone who needs to understand Java security, but especially those who will implement security features in Java applications, will want to own this book. --This text refers to an out of print or unavailable edition of this title.
'This is a great book about Java Security. If you are a Java programmer who want to write secure applications or a system administrator, you should read this book'. Evgeny Gesin, JavaDesk, Israel.
Author interviews, book reviews, editors picks, and more. Read it now
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
Author Scott Oaks does an excellent job in showing the deep security functionality afforded by Java, taking the often abstract Java security concepts and explaining them in a clear and understandable style. As a senior software engineer with Sun Microsystems, Oaks has focused on Java for a number of years, and his expertise shows.
While directed at Java programmers, the book has significant value for any programmer or system administrator who needs to understand how Java security works. Those who may want to exploit Java's rich blend of features should gulp down this book.
The author goes throught the standard stuff about the classloader and JVM security. There are very little examples and discussion for every day programmer. Most of the examples are for those planning to write their own classloaders and security managers. Furthermore, the areas of Cryptography is poorly covered, most of the text is just method explanation from the API documentation. There are very few examples that you migth be able to use.
Generally disappointed - check out Wrox Professional Java Security...
his tome is choked full of the kind of details and examples that java server gurus have known since jdk1.1.3. for example, he gives a very workable example of a READ/WRITE lock algorithm for threads competing for objects .. a simple but effective algorithm that competes well with a full blown queue manger.
need i say more? his book is one of the best on the market of experienced java coders.
anxiously abaiting a real Object/Set database in java ... firstname.lastname@example.org