Securing Java

Securing Java

Online version of Securing Java includes topics like Mobile Code and Security: Why Java Security is Important, Malicious Applets: Avoiding the Common Nuisances, Java Security Guidelines: Developing and Using Java More Securely and The Future of Java Security: Challenges Facing Mobile Code.

Description

The computer field moves so fast that people have begun to refer to Internet time to grapple with its constantly accelerating speed. Three months is a year in Internet time. Java is directly involved in the speed of the field, and has done its share to make things move even more quickly. One tricky aspect of writing a topical book relating to the Web is figuring out when to stop the action. This process can be likened to freeze-framing a picture of a movie. In that sense, this book is a snapshot of Java security. We hope we have succeeded in making it a useful way to learn about Java security.

Table of Contents

  • Mobile Code and Security: Why Java Security is Important
  • The Base Java Security Model: The Original Applet Sandbox
  • Beyond the Sandbox: Signed Code in JDK 1.2
  • Malicious Applets: Avoiding the Common Nuisances
  • Attack Applets: Exploiting Holes in the Security Model
  • Securing Java: Improvements, Solutions, and Snake Oil
  • Java Security Guidelines: Developing and Using Java More Securely
  • Java Card Security: How Smart Cards and Java Mix
  • The Future of Java Security: Challenges Facing Mobile Code

Book Details

Author(s): Gary McGraw and Ed Felton
Format(s): HTML
Link: Read online.








Leave a Reply