Skip to content

Java Security

Spend $50 to get a free DVD!

ISBN-10: 0596001576

ISBN-13: 9780596001575

Edition: 2nd 2001

Authors: Scott Oaks, Deb Cameron

List price: $54.99
Shipping box This item qualifies for FREE shipping.
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!


One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is the in-depth exploration you need. "Java Security, 2nd Edition, focuses on the basic platform features of Java that provide security--the class loader, the bytecode verifier, and the security manager--and recent additions to Java that enhance this security model: digital signatures, security providers, and the access controller. The book covers…    
Customers also bought

Book details

List price: $54.99
Edition: 2nd
Copyright year: 2001
Publisher: O'Reilly Media, Incorporated
Publication date: 5/27/2001
Binding: Paperback
Pages: 624
Size: 7.25" wide x 9.25" long x 1.00" tall
Weight: 1.936
Language: English

Scott Oaks is an architect at Oracle Corporation, where he works on the performance of Oracle’s middleware software. Prior to joining Oracle, he worked for years at Sun Microsystems, specializing in many disparate technologies from the SunOS kernel to network programming and RPCs to windows systems and the OPEN LOOK Virtual Window Manager. In 1996, Scott became a Java evangelist for Sun and in 2001 joined their Java Performance group--which has been his primary focus ever since. Scott also authored O’Reilly’s Java Security, Java Threads, JXTA in a Nutshell, and Jini in a Nutshell titles.

Java Application Security
What Is Security?
Software Used in This Book
The Java Sandbox
Security Debugging
The Default Sandbox
Elements of the Java Sandbox
Code Sources
Policy Files
The Default Sandbox
The File
Comparison with Previous Releases
Java Language Security
Java Language Security Constructs
Enforcement of the Java Language Rules
Comparisons with Previous Releases
The Security Manager
Overview of the Security Manager
Operating on the Security Manager
Methods of the Security Manager
Comparison with Previous Releases
The Access Controller
The CodeSource Class
The Policy Class
Protection Domains
The AccessController Class
Guarded Objects
Comparison with Previous Releases
Java Class Loaders
The Class Loader and Namespaces
Class Loading Architecture
Implementing a Class Loader
Miscellaneous Class Loading Topics
Comparison with Previous Releases
Introduction to Cryptography
The Need for Authentication
The Role of Authentication
Cryptographic Engines
Security Providers
The Architecture of Security Providers
The Provider Class
The Security Class
The Architecture of Engine Classes
Comparison with Previous Releases
Keys and Certificates
Generating Keys
Key Factories
Keys, Certificates, and Object Serialization
Comparison with Previous Releases
Key Management
Key Management Terms
The keytool
The Key Management API
A Key Management Example
Secret Key Management
Comparison with Previous Releases
Message Digests
Using the Message Digest Class
Secure Message Digests
Message Digest Streams
Implementing a MessageDigest Class
Comparison with Previous Releases
Digital Signatures
The Signature Class
Signed Classes
Implementing a Signature Class
Comparison with Previous Releases
Cipher-Based Encryption
The Cipher Engine
Cipher Streams
Sealed Objects
Comparison with Previous Releases
An Overview of SSL and JSSE
SSL Client and Server Sockets
SSL Sessions
SSL Contexts and Key Managers
Miscellaneous SSL Issues
The HTTPS Protocol Handler
Debugging JSSE
Authentication and Authorization
JAAS Overview
Simple JAAS programming
Simple JAAS Administration
Advanced JAAS Topics
The File
Security Resources
Identity-Based Key Management
The Secure Java Container
Implementing a JCE Security Provider
Quick Reference