Win a copy of The Java Performance Companion this week in the Performance forum!
  • Post Reply
  • Bookmark Topic Watch Topic
  • New Topic

For the Authors.

 
Anushe Khan
Ranch Hand
Posts: 74
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
HI

1.How would you compare your book with other books like Pankaj Kumar�s book J2ee Security for Servlets,Ejb�s?
2. Can it be used as a good reference book on J2SE security topics and security aspects of Enterprise Applications Technologies.
or
The main focus is only on security aspects of Enterprise applications technologies (Servlets, EJBs and Web Services)?
Thanks.
 
Marco Pistoia
Author
Greenhorn
Posts: 27
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Hi Anushe,
Here are my answers.
1.How would you compare your book with other books like Pankaj Kumar�s book J2ee Security for Servlets,Ejb�s?
ANSWER: Well, I don't want to be that one who says that his own book is better than others. The truth is that we made a choice when we started to write this book. We really wanted to write a definitive guide to Java security and cover all the hot topics. So we go over Servlets and EJBs, but we do much more than that: we have lots of crypto, Web services, J2EE and J2SE stuff.
2. Can it be used as a good reference book on J2SE security topics and security aspects of Enterprise Applications Technologies.
or
The main focus is only on security aspects of Enterprise applications technologies (Servlets, EJBs and Web Services)?
ANSWER: We covered J2EE and J2SE security in detail. But we covered lots of related topics as well: cryptography, architectures, scenarios, firewalls, etc. So hopefully our book will be a good reference for anybody who needs to work on an enterprise system securely.
Thanks,
Marco Pistoia
 
Nicholas Cheung
Ranch Hand
Posts: 4982
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Hi Marco,

But we covered lots of related topics as well: cryptography, architectures, scenarios, firewalls, etc

How deep does those topics covered? They will be discussed in overview, or in detail, such as algorithms, or?
Thanks.
Nick
 
bas duijzings
Ranch Hand
Posts: 83
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
and code examples as well for the latter mentioned techniques ?
 
Pradeep bhatt
Ranch Hand
Posts: 8927
Firefox Browser Java Spring
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Originally posted by bas duijzings:
and code examples as well for the latter mentioned techniques ?

From the Customer review in amazon, looks like there are less sample code.
http://www.amazon.com/exec/obidos/tg/detail/-/0321118898/ref=cm_rev_all_1/002-9449884-1448803?v=glance&s=books&vi=customer-reviews
 
Nicholas Cheung
Ranch Hand
Posts: 4982
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
I feel the style of the book is a bit classic, which focus on theory, and only use codes to illustrate some difficult concepts.
Thus, I would like to know how in depth the concepts being discussed.
Nick
 
Marco Pistoia
Author
Greenhorn
Posts: 27
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
We cover the topics of cryptography in great depth. We dedicate a whole chapter to the theory of cryptography, even explaining the math behind the algorithms. JCA, JCE, JSSE, and JAAS are covered in great detail with tons of examples.
On amazon we got a partially negative review (3 stars) which basically said that we did not have enough source code and that the book seemed like a white paper. However, that review was based on a very early draft of the book (Addison-Wesley hired that reviewer about a year and a half ago). Since then the book changed, almost duplicated. We were still writing at the time the review was done. I was surprised to find on amazon the same words I read one and a half year ago. Looks like the reviewer has not read the final result, which contains 68 Java programs, some of which are 5 pages long.
Fortunately, another reviewer just gave us 5 stars and defined our book "The BEST book on Java/J2EE security," a sign that he was not influenced by an early reading.
 
Anushe Khan
Ranch Hand
Posts: 74
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Thanks Marco.
 
  • Post Reply
  • Bookmark Topic Watch Topic
  • New Topic