Hacking Exposed J2EE & Java
Art Taylor, Brian Buege, Randy Layman
- 出版商: McGraw-Hill Education
- 出版日期: 2002-09-24
- 售價: $2,240
- 貴賓價: 9.5 折 $2,128
- 語言: 英文
- 頁數: 426
- 裝訂: Paperback
- ISBN: 0072225653
- ISBN-13: 9780072225655
-
相關分類:
Java 程式語言、駭客 Hack
已過版
買這商品的人也買了...
-
$399CCNA Self-Study: Interconnecting Cisco Network Devices (Hardcover)
-
$2,600$2,470 -
$680$578 -
$1,200$1,176 -
$399Hacking Linux Exposed (Paperback)
-
$299Hacking Exposed: Windows 2000 (Paperback)
-
$970Introduction to Algorithms, 2/e
-
$199$199 -
$380$323 -
$1,150$1,127 -
$2,220$2,109 -
$1,890$1,796 -
$490$387 -
$690$538 -
$1,260CCNA Certification Library (CCNA Self-Study, exam #640-801), 6/e
-
$640$576 -
$149$149 -
$750$675 -
$825Automating Unix and Linux Administration (Paperback)
-
$820$648 -
$580$522 -
$480$408 -
$620$527 -
$490$417 -
$680$537
相關主題
商品描述
Secure your Java and J2EE applications--from the hackers perspective
Application security is a highly complex topic with new vulnerabilities surfacing every day. Break-ins, fraud, sabotage, and DoS attacks are on the rise, and quickly evolving Java-based technology makes safeguarding enterprise applications more challenging than ever. Hacking Exposed J2EE & Java will show you, step-by-step, how to defend against the latest attacks by understanding the hackers methods and thought processes. Youll gain insight through examples of real-world attacks, both ordinary and sophisticated, and get valuable countermeasures to protect against them. Youll also find an in-depth case study with Java and J2EE security examples and actual working code incorporated throughout the book.
What youll learn:
- The proven Hacking Exposed methodology to locate and patch vulnerable
systems
- How to apply effective security countermeasures to applications which use
the following Java enterprise technologies:
Servlets and Java Server Pages (JSPs); Enterprise Java Beans (EJBs); Web Services; Applets; Java Web Start; Remote Method Invocation (RMI); Java Message Service (JMS)
- How to design a security strategy that extends throughout a multi-tiered
J2EE architecture using J2SE 1.4 and J2EE 1.3
- What common, but devastating, vulnerabilities exist within many J2EE
applications
- How to use the J2EE security architecture to create secure J2EE
applications
- How to use the Java security APIs, including the Java Authentication and
Authorization Service (JAAS), the Java Cryptography Extension (JCE), and the
Java Secure Socket Extension (JSSE)
- How to create applications that proactively defend against malicious
users, content manipulation, and other attacks.
- Valuable tips for hardening J2EE applications based on the authors
expertise
Contents
Part I: Secure Java for the
Enterprise
Ch. 1: Java Security
Basics
Ch. 2: Java for the Enterprise: J2EE and the Web
Application
Part II: Java Application
Security
Ch. 3: The Malicious Applet and
Friends
Ch. 4: Java Client-Server
Applications
Part III: Java Network Security
Issues
Ch. 5: Java Network Applications: Potential
Security Flaws
Part IV: Java Security on the Web
Tier
Ch. 6: Hacking the Web Site: Exploiting Java Web
Tier Components
Ch. 7: Java Servlets and Java Server
Pages: Security Flaws and Weaknesses
Part V: Java Security
on the Business Tier
Ch. 8: Role Based Security: J2EE
Security Realms
Ch. 9: Controlling
Resources
Part VI:
Appendices
Appendix A: Example
Application
Appendix B:
Firewalls
Appendix C: Operating Systems
Security
Appendix D: Java Security Related
APIs