Java Security (2nd Edition) Second Edition
Scott Oaks (Author) Find all the books, read about the author, and more. See search results for this author |



Use the Amazon App to scan ISBNs and compare prices.

One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is the in-depth exploration you need.Java Security, 2nd Edition, focuses on the basic platform features of Java that provide security--the class loader, the bytecode verifier, and the security manager--and recent additions to Java that enhance this security model: digital signatures, security providers, and the access controller. The book covers the security model of Java 2, Version 1.3, which is significantly different from that of Java 1.1. It has extensive coverage of the two new important security APIs: JAAS (Java Authentication and Authorization Service) and JSSE (Java Secure Sockets Extension). Java Security, 2nd Edition, will give you a clear understanding of the architecture of Java's security model and how to use that model in both programming and administration.The book is intended primarily for programmers who want to write secure Java applications. However, it is also an excellent resource for system and network administrators who are interested in Java security, particularly those who are interested in assessing the risk of using Java and need to understand how the security model works in order to assess whether or not Java meets their security needs.
Customers who viewed this item also viewed
Customers who bought this item also bought
Editorial Reviews
About the Author
Scott Oaks is a Java Technologist at Sun Microsystems, where he has worked since 1987. While at Sun, he has specialized in many disparate technologies, from the SunOS kernel to network programming and RPCs. Since 1995, hes focused primarily on Java and bringing Java technology to end-users. Scott also authored OReillys Java Security, Java Threads and Jini in a Nutshell titles.
Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.
Product details
- Publisher : O'Reilly Media; Second edition (June 12, 2001)
- Language : English
- Paperback : 620 pages
- ISBN-10 : 0596001576
- ISBN-13 : 978-0596001575
- Item Weight : 2.15 pounds
- Dimensions : 7 x 1.19 x 9.19 inches
- Best Sellers Rank: #2,355,324 in Books (See Top 100 in Books)
- #281 in CompTIA Certification Guides
- #1,416 in Java Programming
- #1,979 in Computer Network Security
- Customer Reviews:
About the author

Discover more of the author’s books, see similar authors, read author blogs and more
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonTop reviews from the United States
There was a problem filtering reviews right now. Please try again later.
overall I checked out the Oracle site on this topic and, sure enough not many obvious changes, so the information in this book is still relevant
Author Scott Oaks does an excellent job in showing the deep security functionality afforded by Java, taking the often abstract Java security concepts and explaining them in a clear and understandable style. As a senior software engineer with Sun Microsystems, Oaks has focused on Java for a number of years, and his expertise shows.
While directed at Java programmers, the book has significant value for any programmer or system administrator who needs to understand how Java security works. Those who may want to exploit Java's rich blend of features should gulp down this book.
I used to find java security a bit complicated, got pieces of information from articles that I read, but I ended up having more questions.
Some of the APIs shown in the examples are deprecated for JDK 1.4, but you can easily replace them with the new classes.
Top reviews from other countries


