Java Security SolutionsISBN: 978-0-7645-4928-1
Paperback
720 pages
September 2002
This title is out-of-print and not currently available for purchase from this site.
|
Preface.
Acknowledgments.
Part I: Introduction to Security.
Chapter 1: Security Basics.
Chapter 2: Hackers and Their Tools.
Chapter 3: Java Security Components.
Part II: Identity and Authentication.
Chapter 4: Key Management Algorithms.
Chapter 5: Elliptic Curve Cryptography.
Chapter 6: Key Management Through the Internet Protocol.
Chapter 7: Implementing Keys with Java.
Chapter 8: Java Implementation of Key Management.
Part III: Data Integrity.
Chapter 9: Ensuring Data Integrity.
Chapter 10: Ensuring Message Authentication.
Chapter 11: Signature Integrity.
Part IV: Data Hiding.
Chapter 12: Understanding Ciphers.
Chapter 13: Extending New Ciphers with the JDK.
Chapter 14: Applying Ciphers.
Part V: Resource Access Using Java.
Chapter 15: Securing Enterprise Resources.
Chapter 16: Java Authentication and Authorization Through Kerberos.
Chapter 17: Securing Messages with the Java GSS-API.
Chapter 18: Java Access: The Security Manager.
Chapter 19: Java Authentication and Authorization Service.
Part VI: Enterprise Data Security.
Chapter 20: Working with Database Security.
Part VII: Network Access.
Chapter 21: Network Security Architecture.
Chapter 22: SSL and TLS.
Chapter 23: Java Secure Socket Extension.
Part VIII: Public Key Management.
Chapter 24: Java Digital Certificates.
Chapter 25: PKI Management.
Part IX: Enterprise Access.
Chapter 26: Java Enterprise Security and Web Services Security.
Chapter 27: Securing Client-Side Components.
Chapter 28: Securing Server-Side Components.
Chapter 29: Application Security with Java.
Index.
Acknowledgments.
Part I: Introduction to Security.
Chapter 1: Security Basics.
Chapter 2: Hackers and Their Tools.
Chapter 3: Java Security Components.
Part II: Identity and Authentication.
Chapter 4: Key Management Algorithms.
Chapter 5: Elliptic Curve Cryptography.
Chapter 6: Key Management Through the Internet Protocol.
Chapter 7: Implementing Keys with Java.
Chapter 8: Java Implementation of Key Management.
Part III: Data Integrity.
Chapter 9: Ensuring Data Integrity.
Chapter 10: Ensuring Message Authentication.
Chapter 11: Signature Integrity.
Part IV: Data Hiding.
Chapter 12: Understanding Ciphers.
Chapter 13: Extending New Ciphers with the JDK.
Chapter 14: Applying Ciphers.
Part V: Resource Access Using Java.
Chapter 15: Securing Enterprise Resources.
Chapter 16: Java Authentication and Authorization Through Kerberos.
Chapter 17: Securing Messages with the Java GSS-API.
Chapter 18: Java Access: The Security Manager.
Chapter 19: Java Authentication and Authorization Service.
Part VI: Enterprise Data Security.
Chapter 20: Working with Database Security.
Part VII: Network Access.
Chapter 21: Network Security Architecture.
Chapter 22: SSL and TLS.
Chapter 23: Java Secure Socket Extension.
Part VIII: Public Key Management.
Chapter 24: Java Digital Certificates.
Chapter 25: PKI Management.
Part IX: Enterprise Access.
Chapter 26: Java Enterprise Security and Web Services Security.
Chapter 27: Securing Client-Side Components.
Chapter 28: Securing Server-Side Components.
Chapter 29: Application Security with Java.
Index.