Win a copy of Getting started with Java on the Raspberry Pi this week in the Raspberry Pi forum!
  • Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
  • Campbell Ritchie
  • Ron McLeod
  • Paul Clapham
  • Tim Cooke
  • Jeanne Boyarsky
  • Rob Spoor
  • Devaka Cooray
  • Liutauras Vilda
Saloon Keepers:
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Tim Moores
  • Mikalai Zaikin
  • Piet Souris

Java Security by Scott Oaks (O'Reilly)

Posts: 5089
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
The everything you need to know book about Java Security. The book provides a solid foundation of the classes that comprise the Java Security model. The book starts out with an overview of the Java 2 security model and quickly moves in to details of the �Java Sandbox�. The author explains the fine points of permissions and policy files as related to the file. That�s it for the basics; this book is definitely for the advanced Java programmer.
The book goes in to detail describing class loaders and byte code verifiers, explaining how they are implemented within the JVM. A brief introduction to cryptography, this is a topic that warrants it�s own book. There is extensive coverage of keys, certificates and key management, including examples of how to construct key pairs - both public/private and secret keys. Additionally there are examples of how to generate message digests and use them to create and verify digital signatures. The book also covers creating and verifying signed classes using the jarsigner tool.
Advanced topics cover the use Cipher engines for encryption using JCE. There is in-depth coverage on SSL/HHTPS, but this is the only place that I found the examples lacking. And to round out the security features, there is a chapter on JAAS that gets in to both the administrative and programmatic sides.
Overall, this is an excellent book on security and a welcome addition to the serious java developer�s bookshelf.
(Annmarie Ziegler - greenhorn, August 2001)

More info at
More info at
More info at

If somebody says you look familiar, tell them you are in porn. Or in these tiny ads:
Low Tech Laboratory
    Bookmark Topic Watch Topic
  • New Topic