Home » , » Download PDF Java Security Solutions Rich Helton and Johennie Helton

Download PDF Java Security Solutions Rich Helton and Johennie Helton


Sinopsis


The old adage "Information is power" is more true than ever for the corporate world. Even the release of very general information about a company (for example, an upcoming merger between company A and company B) can have a profound impact on a company. For example, in the case of a corporate merger, if confidential information about a proposed merger is leaked to the press or other companies, the merger could be in jeopardy. In today's corporate environment, these basic principles can have a dramatic impact on the security of the organization. Developers who implement security measures must be mindful of not only the complex security techniques that are discussed throughout this book, but also the basic, commonsense concepts that apply to any discussion of confidentiality and security.


Content

  1. Part I - Introduction to Security
  2. Chapter 1 - Security Basics
  3. Chapter 2 - Hackers and Their Tools
  4. Chapter 3 - Java Security Components
  5. Part II - Identity and Authentication
  6. Chapter 4 - Key Management Algorithms
  7. Chapter 5 - Elliptic Curve Cryptography
  8. Chapter 6 - Key Management Through the Internet Protocol
  9. Chapter 7 - Implementing Keys with Java
  10. Chapter 8 - Java Implementation of Key Management
  11. Part III - Data Integrity
  12. Chapter 9 - Ensuring Data Integrity
  13. Chapter 10 - Ensuring Message Authentication
  14. Chapter 11 - Signature Integrity
  15. Part IV - Data Hiding
  16. Chapter 12 - Understanding Ciphers
  17. Chapter 13 - Extending New Ciphers with the JDK
  18. Chapter 14 - Applying Ciphers
  19. Part V - Resource Access Using Java
  20. Chapter 15 - Securing Enterprise Resources
  21. Chapter 16 - Java Authentication and Authorization Through Kerberos
  22. Chapter 17 - Securing Messages with the Java GSS-API
  23. Chapter 18 - Java Access: The Security Manager
  24. Chapter 19 - Java Authentication and Authorization Service
  25. Part VI - Enterprise Data Security
  26. Chapter 20 - Working with Database Security
  27. Part VII - Network Access
  28. Chapter 21 - Network Security Architecture
  29. Chapter 22 - SSL and TLS
  30. Chapter 23 - Java Secure Socket Extension
  31. Part VIII - Public Key Management
  32. Chapter 24 - Java Digital Certificates
  33. Chapter 25 - PKI Management
  34. Part IX - Enterprise Access
  35. Chapter 26 - Java Enterprise Security and Web Services Security
  36. Chapter 27 - Securing Client-Side Components
  37. Chapter 28 - Securing Server-Side Components
  38. Chapter 29 - Application Security with Java




0 komentar:

Posting Komentar