Item Details

Java Security

Scott Oaks
Format
Book
Published
Sebastopol, CA : O'Reilly, c2001.
Edition
2nd ed
Language
English
ISBN
0596001576
Contents
  • 1. Java Application Security 1
  • What Is Security? 1
  • Java Sandbox 10
  • Security Debugging 15
  • 2. Default Sandbox 18
  • Elements of the Java Sandbox 18
  • Keystores 32
  • Code Sources 32
  • Policy Files 33
  • Default Sandbox 38
  • Java.security File 41
  • Comparison with Previous Releases 41
  • 3. Java Language Security 43
  • Java Language Security Constructs 44
  • Enforcement of the Java Language Rules 50
  • Comparisons with Previous Releases 56
  • 4. Security Manager 58
  • Overview of the Security Manager 59
  • Operating on the Security Manager 64
  • Methods of the Security Manager 65
  • Comparison with Previous Releases 80
  • 5. Access Controller 84
  • CodeSource Class 85
  • Policy Class 98
  • Protection Domains 101
  • AccessController Class 102
  • Guarded Objects 109
  • Comparison with Previous Releases 110
  • 6. Java Class Loaders 112
  • Class Loader and Namespaces 112
  • Class Loading Architecture 115
  • Implementing a Class Loader 117
  • Miscellaneous Class Loading Topics 127
  • Comparison with Previous Releases 129
  • 7. Introduction to Cryptography 131
  • Need for Authentication 132
  • Role of Authentication 137
  • Cryptographic Engines 138
  • 8. Security Providers 146
  • Architecture of Security Providers 146
  • Provider Class 152
  • Security Class 158
  • Architecture of Engine Classes 163
  • Comparison with Previous Releases 164
  • 9. Keys and Certificates 166
  • Keys 167
  • Generating Keys 172
  • Key Factories 181
  • Certificates 189
  • Keys, Certificates, and Object Serialization 202
  • Comparison with Previous Releases 203
  • 10. Key Management 205
  • Key Management Terms 206
  • Keytool 209
  • Key Management API 221
  • A Key Management Example 228
  • Secret Key Management 234
  • Comparison with Previous Releases 241
  • 11. Message Digests 244
  • Using the Message Digest Class 244
  • Secure Message Digests 248
  • Message Digest Streams 251
  • Implementing a MessageDigest Class 255
  • Comparison with Previous Releases 260
  • 12. Digital Signatures 261
  • Signature Class 261
  • Signed Classes 272
  • Implementing a Signature Class 281
  • Comparison with Previous Releases 286
  • 13. Cipher-Based Encryption 288
  • Cipher Engine 288
  • Cipher Streams 305
  • Sealed Objects 309
  • Comparison with Previous Releases 310
  • 14. SSL and HTTPS 311
  • An Overview of SSL and JSSE 311
  • SSL Client and Server Sockets 321
  • SSL Sessions 324
  • SSL Contexts and Key Managers 327
  • Miscellaneous SSL Issues 337
  • HTTPS Protocol Handler 341
  • Debugging JSSE 344
  • 15. Authentication and Authorization 346
  • JAAS Overview 347
  • Simple JAAS programming 349
  • Simple JAAS Administration 352
  • Advanced JAAS Topics 362
  • A. Java.security File 379
  • B. Security Resources 382
  • C. Identity-Based Key Management 392
  • D. Secure Java Container 420
  • E. Implementing a JCE Security Provider 450
  • F. Quick Reference 458.
Description
xvi, 599 p. : ill. ; 24 cm.
Notes
  • "Covers JAAS and JSEE"--Cover.
  • "Writing and deploying secure applications"--Cover.
  • "Covers Java 1.1, Java 2, and JCE 1.2.1"--P. [4] of cover.
  • Includes bibliographical references (p. 382-391) and index.
Technical Details
  • Access in Virgo Classic

  • LEADER 04119nam a2200337Ia 4500
    001 u3735059
    003 SIRSI
    005 20010822080000.0
    008 010626s2001 caua 001 0 eng d
    020
      
      
    a| 0596001576
    035
      
      
    a| (Sirsi) i0596001576
    035
      
      
    a| (OCoLC)47195850
    040
      
      
    a| ORX c| ORX d| CUS d| MvI
    090
      
      
    a| QA76.73.J38 b| O247 2001
    100
    1
      
    a| Oaks, Scott.
    245
    1
    0
    a| Java security / c| Scott Oaks.
    250
      
      
    a| 2nd ed.
    260
      
      
    a| Sebastopol, CA : b| O'Reilly, c| c2001.
    300
      
      
    a| xvi, 599 p. : b| ill. ; c| 24 cm.
    500
      
      
    a| "Covers JAAS and JSEE"--Cover.
    500
      
      
    a| "Writing and deploying secure applications"--Cover.
    500
      
      
    a| "Covers Java 1.1, Java 2, and JCE 1.2.1"--P. [4] of cover.
    504
      
      
    a| Includes bibliographical references (p. 382-391) and index.
    505
    0
    0
    g| 1. t| Java Application Security g| 1 -- t| What Is Security? g| 1 -- t| Java Sandbox g| 10 -- t| Security Debugging g| 15 -- g| 2. t| Default Sandbox g| 18 -- t| Elements of the Java Sandbox g| 18 -- t| Keystores g| 32 -- t| Code Sources g| 32 -- t| Policy Files g| 33 -- t| Default Sandbox g| 38 -- t| Java.security File g| 41 -- t| Comparison with Previous Releases g| 41 -- g| 3. t| Java Language Security g| 43 -- t| Java Language Security Constructs g| 44 -- t| Enforcement of the Java Language Rules g| 50 -- t| Comparisons with Previous Releases g| 56 -- g| 4. t| Security Manager g| 58 -- t| Overview of the Security Manager g| 59 -- t| Operating on the Security Manager g| 64 -- t| Methods of the Security Manager g| 65 -- t| Comparison with Previous Releases g| 80 -- g| 5. t| Access Controller g| 84 -- t| CodeSource Class g| 85 -- t| Policy Class g| 98 -- t| Protection Domains g| 101 -- t| AccessController Class g| 102 -- t| Guarded Objects g| 109 -- t| Comparison with Previous Releases g| 110 -- g| 6. t| Java Class Loaders g| 112 -- t| Class Loader and Namespaces g| 112 -- t| Class Loading Architecture g| 115 -- t| Implementing a Class Loader g| 117 -- t| Miscellaneous Class Loading Topics g| 127 -- t| Comparison with Previous Releases g| 129 -- g| 7. t| Introduction to Cryptography g| 131 -- t| Need for Authentication g| 132 -- t| Role of Authentication g| 137 -- t| Cryptographic Engines g| 138 -- g| 8. t| Security Providers g| 146 -- t| Architecture of Security Providers g| 146 -- t| Provider Class g| 152 -- t| Security Class g| 158 -- t| Architecture of Engine Classes g| 163 -- t| Comparison with Previous Releases g| 164 -- g| 9. t| Keys and Certificates g| 166 -- t| Keys g| 167 -- t| Generating Keys g| 172 -- t| Key Factories g| 181 -- t| Certificates g| 189 -- t| Keys, Certificates, and Object Serialization g| 202 -- t| Comparison with Previous Releases g| 203 -- g| 10. t| Key Management g| 205 -- t| Key Management Terms g| 206 -- t| Keytool g| 209 -- t| Key Management API g| 221 -- t| A Key Management Example g| 228 -- t| Secret Key Management g| 234 -- t| Comparison with Previous Releases g| 241 -- g| 11. t| Message Digests g| 244 -- t| Using the Message Digest Class g| 244 -- t| Secure Message Digests g| 248 -- t| Message Digest Streams g| 251 -- t| Implementing a MessageDigest Class g| 255 -- t| Comparison with Previous Releases g| 260 -- g| 12. t| Digital Signatures g| 261 -- t| Signature Class g| 261 -- t| Signed Classes g| 272 -- t| Implementing a Signature Class g| 281 -- t| Comparison with Previous Releases g| 286 -- g| 13. t| Cipher-Based Encryption g| 288 -- t| Cipher Engine g| 288 -- t| Cipher Streams g| 305 -- t| Sealed Objects g| 309 -- t| Comparison with Previous Releases g| 310 -- g| 14. t| SSL and HTTPS g| 311 -- t| An Overview of SSL and JSSE g| 311 -- t| SSL Client and Server Sockets g| 321 -- t| SSL Sessions g| 324 -- t| SSL Contexts and Key Managers g| 327 -- t| Miscellaneous SSL Issues g| 337 -- t| HTTPS Protocol Handler g| 341 -- t| Debugging JSSE g| 344 -- g| 15. t| Authentication and Authorization g| 346 -- t| JAAS Overview g| 347 -- t| Simple JAAS programming g| 349 -- t| Simple JAAS Administration g| 352 -- t| Advanced JAAS Topics g| 362 -- g| A. t| Java.security File g| 379 -- g| B. t| Security Resources g| 382 -- g| C. t| Identity-Based Key Management g| 392 -- g| D. t| Secure Java Container g| 420 -- g| E. t| Implementing a JCE Security Provider g| 450 -- g| F. t| Quick Reference g| 458.
    596
      
      
    a| 5
    650
      
    0
    a| Java (Computer program language)
    650
      
    0
    a| Computer security.
    994
      
      
    a| Z0 b| VA@
    999
      
      
    a| QA76.73 .J38 O247 2001 w| LC i| X004524415 l| STACKS m| SCI-ENG t| BOOK

Availability

Google Preview

Library Location Map Availability Call Number
Brown Science and Engineering Stacks N/A Available