Java Security, 2nd Edition (en anglais)

Aucun prix
Meilleur prix près de chez moi

Proline

0 avis clients

Donnez votre avis

Une table de cuisson posable élégante et moderne !Les 2 thermostats indépendants pour chaque foyer vous permettent de régler la bonne température selon le type de préparation. Grâce aux 2 voyants de sécurité, vous savez à tout moment si les plaques sont chaudes.Elle possède 2 couvercles en inox brossé afin de la protégé de la poussière.Son esthétique en inox brossé lui permet de s'intégrer dans les cuisines les plus modernes aux couleurs métallisées.Ses pieds en caoutchouc lui assurent une stabilité optimale.

categorie

Livres ; Informatique-Internet ; Livres sur Sécurité ;

Description

Une table de cuisson posable élégante et moderne !Les 2 thermostats indépendants pour chaque foyer vous permettent de régler la bonne température selon le type de préparation. Grâce aux 2 voyants de sécurité, vous savez à tout moment si les plaques sont chaudes.Elle possède 2 couvercles en inox brossé afin de la protégé de la poussière.Son esthétique en inox brossé lui permet de s'intégrer dans les cuisines les plus modernes aux couleurs métallisées.Ses pieds en caoutchouc lui assurent une stabilité optimale.

Amazon.com

Scott Oakes' Java Security is extraordinary both for its technical depth and its readability. It provides the Java programmer with a complete overview of the Java security architecture and security classes, plus a wealth of detailed information and code examples for specific implementations. The book opens with a clear discussion of what Java security is, how the various Java sandbox models work, and how Java applications and applets execute within the security model. The following chapters look in depth at the elements of the Java security architecture: language rules, class loaders, the security manager, the access controller, and permission objects. All these chapters provide detailed information on implementation, as well as an excellent explanation of the role of each feature within the entire security picture. The second half of the book covers cryptographic features in the Java security package (much enhanced in Java 1.2) and how Java programs work with code that performs authentication and encryption. Here, you'll find detailed chapters on message digests, keys and certificates, key management, digital signatures, and the Java Cryptography Extensions. Anyone who needs to understand Java security, but especially those who will implement security features in Java applications, will want to own this book.

Format

Broché

Nombre de pages

622

ISBN

0596001576

Editeur

O'Reilly

Date de publication

2001-06-01

Amazon.co.uk

The second edition of Java Security is intended to help you build and deploy secure Java programs on private and public networks. It covers Java 1.1, Java 2, JCE 1.2.1, JSSE and JAAS (the last two absent from the first edition) and combines coverage of the core Java security features with the three optional security APIs. They will be combined in the next Java release--so you're ahead of the curve. Security has different meanings depending on context. Java's core sandbox security model was originally intended to defeat viruses and trojans. Authentication, encryption and other security models were added to provide different kinds of security. The authors explain how Java components work so they can show how they might be subverted. Without knowing what the risks are you can't apply effective security measures. The Java security features examined include class loaders, cryptography, certificates, key management, signatures, SSL, authentication and permissions. The authors explain where and how particular security features are best implemented and explain their limitations in the real world. For example, many people routinely grant signed Java applets permission to read and write files on their system believing a signed certificate somehow makes the application safe. In practice, as anyone can create and sign a Java applet or application it proves nothing of the kind and can still be setting you up for a fall. Java security is non-trivial. Security is an arms race in which the two sides constantly leapfrog each other. Java Security is well written with many examples but it's a fairly technical read. If you're serious about Java application development, however, you need to read it. Because you can be sure the bad guys will. -- Steve Patient

Auteur

Oaks

attributs

Support / Quantité fournie=1 ;Dimensions et poids / Poids=1101 g;Lieu de parution=Sebastopol, Etats Unis;Livres / Période=Livre édité depuis 1980;Classification Decitre 1=Informatique;Classification Decitre 2=Programmation;Classification Decitre 3=Sécurité;Livres / Format=Broché;Propriétaire=Decitre;Date=2001-05-01 00

theme

Broché

realisateur

Scott Oaks

stock

1

Ces produits pourraient vous intéresser
Personnaliser J'ai compris