* Provides practical solutions, not just principles of security. * Offers an in depth toolkit to the reader and explains how to use the tools to build a secure system. * Introduces concepts of security patterns for designing systems, as well as security building blocks for systems. * Discusses algorithms, cryptography and architecture. * Addresse security for different application servers.
This is the third Java Security book that I have read. The first two left me wondering about why I would apply a technology. This book covers the all standards and api's for implementing security in a Java based environment, but it adds the element of why and when to apply a particular strategy. The Heltons have described many different types of attacks and what you can do to combat them by using the strategies outlined. I found that much more useful than a regurgitation of specs, standards, and api's.This book also has details, with code, of crytographic algorithms and key exchange algorithms, and describes the strengths and weaknesses of all of them. Really detailed.This book covers all the bases. It could be used as a reference manual, a text on Java Security, or a handbook for an IT Security Manager. I'm keeping right by my keyboard.
Excellent!
Published by Thriftbooks.com User , 22 years ago
I picked up this book some time ago, when I needed a good book on how to manage certain problems with a cryptographic application I was developing. I already had exposure to the concepts of cryptography, and all I needed was a way to tie it in with Java. I had read the Security FAQ at the Java website, but was needing more.This book was an excellent contrast to the Security packages FAQ. Cryptic comments wereexplained in much more detail, and many examples are included. For those who don't have much exposure to cryptography, there's a whole section on it.All in all, a great value!
Java Security Solutions - Review
Published by Thriftbooks.com User , 23 years ago
This book not only provides the information necessary to understand and implement Java security, but does so in a very organized and readable manner. The use of comparisons to real world (non-IT) security should prove particularly useful to those fairly new to IT security issues. Similarly, the implementation examples are very helpful to those actually implementing Java security solutions. Very nicely done!
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.