Sinopsis
The old adage "Information is power" is more true than ever for the corporate world. Even the release of very general information about a company (for example, an upcoming merger between company A and company B) can have a profound impact on a company. For example, in the case of a corporate merger, if confidential information about a proposed merger is leaked to the press or other companies, the merger could be in jeopardy. In today's corporate environment, these basic principles can have a dramatic impact on the security of the organization. Developers who implement security measures must be mindful of not only the complex security techniques that are discussed throughout this book, but also the basic, commonsense concepts that apply to any discussion of confidentiality and security.
Content
- Part I - Introduction to Security
- Chapter 1 - Security Basics
- Chapter 2 - Hackers and Their Tools
- Chapter 3 - Java Security Components
- Part II - Identity and Authentication
- Chapter 4 - Key Management Algorithms
- Chapter 5 - Elliptic Curve Cryptography
- Chapter 6 - Key Management Through the Internet Protocol
- Chapter 7 - Implementing Keys with Java
- Chapter 8 - Java Implementation of Key Management
- Part III - Data Integrity
- Chapter 9 - Ensuring Data Integrity
- Chapter 10 - Ensuring Message Authentication
- Chapter 11 - Signature Integrity
- Part IV - Data Hiding
- Chapter 12 - Understanding Ciphers
- Chapter 13 - Extending New Ciphers with the JDK
- Chapter 14 - Applying Ciphers
- Part V - Resource Access Using Java
- Chapter 15 - Securing Enterprise Resources
- Chapter 16 - Java Authentication and Authorization Through Kerberos
- Chapter 17 - Securing Messages with the Java GSS-API
- Chapter 18 - Java Access: The Security Manager
- Chapter 19 - Java Authentication and Authorization Service
- Part VI - Enterprise Data Security
- Chapter 20 - Working with Database Security
- Part VII - Network Access
- Chapter 21 - Network Security Architecture
- Chapter 22 - SSL and TLS
- Chapter 23 - Java Secure Socket Extension
- Part VIII - Public Key Management
- Chapter 24 - Java Digital Certificates
- Chapter 25 - PKI Management
- Part IX - Enterprise Access
- Chapter 26 - Java Enterprise Security and Web Services Security
- Chapter 27 - Securing Client-Side Components
- Chapter 28 - Securing Server-Side Components
- Chapter 29 - Application Security with Java
0 komentar:
Posting Komentar