Flylib.com
Java Security Solutions
Java Security Solutions
ISBN: 0764549286
EAN: 2147483647
Year: 2001
Pages: 222
Authors:
Rich Helton
,
Johennie Helton
BUY ON AMAZON
Java Security Solutions
Table of Contents
Preface
Why Java?
What You Need to Know
How This Book Is Organized
Conventions Used in this Book
Companion Web Site
Contacting the Authors
Acknowledgments
Part I: Introduction to Security
Chapter 1: Security Basics
Introduction
Protecting Your Information in Today s World
The Four Pillars of Security
Mapping Security Features to the Digital World
Summary
Chapter 2: Hackers and Their Tools
Introduction
Looking for the Hack
Different Types of Hacks and How They Work
Understanding Network Attacks
Protecting Against Hackers
Summary
Chapter 3: Java Security Components
Categorizing Security Elements
Categorizing Security Components in Java
How Do the Components Fit Together?
Summary
Part II: Identity and Authentication
Chapter 4: Key Management Algorithms
Understanding the Purpose of Keys
Understanding the Mathematics
Symmetric versus Asymmetric Keys
The Diffie-Hellman Key Exchange
The Rivest, Shamir, and Adleman Key Exchange
The Future of Key Exchanges
Summary
Chapter 5: Elliptic Curve Cryptography
Understanding the Mathematics of ECC
The ECCDH Key Exchange
Summary
Chapter 6: Key Management Through the Internet Protocol
The Internet Protocol Security Protocol
The Simple Authentication and Security Layer
Summary
Chapter 7: Implementing Keys with Java
Introduction
Understanding DSA: The Digital Signature Algorithm
Generating Key Pairs with Java
Generating the Secret Key with Java
Summary
Chapter 8: Java Implementation of Key Management
KeyStore
PKCS 12 KeyStore
Truststore
TrustManager
Policy File
Policytool
Summary
Part III: Data Integrity
Chapter 9: Ensuring Data Integrity
Understanding the Hash Function
Understanding the Message Digest
Understanding the Different Message Digest Algorithms
Implementing the Different Message Digest Algorithms in Java
Summary
Chapter 10: Ensuring Message Authentication
Understanding the MAC
Implementing the MAC
Summary
Chapter 11: Signature Integrity
Understanding the Digital Signature Algorithm (DSA)
Understanding the RSA Digital Signature Algorithm
Understanding the Elliptic Curve Digital Signature Algorithm
Implementing the Digital Signature Algorithm (DSA)
Summary
Part IV: Data Hiding
Chapter 12: Understanding Ciphers
Understanding Symmetric Ciphers
Implementing RSA Public Key Encryption
Some Security Suggestions
Summary
Chapter 13: Extending New Ciphers with the JDK
Implementing a CipherSpi
Implementing the RC4 Stream Cipher
Summary
Chapter 14: Applying Ciphers
Understanding PBE
Understanding Blowfish
Some Implementations in Ciphers
Java Smart Card Basics
Summary
Part V: Resource Access Using Java
Chapter 15: Securing Enterprise Resources
Common Criteria for Security Systems
Understanding Your Security Needs
Fulfilling Your Security Requirements
Summary
Chapter 16: Java Authentication and Authorization Through Kerberos
Introduction to Kerberos
Principal Names and Key Distribution Center
The Kerberos Authenticator
The Kerberos Principal Database
Java Kerberos
Summary
Chapter 17: Securing Messages with the Java GSS-API
Implementing the GSS with Initiators and Acceptors
Authenticating with JAAS
Summary
Chapter 18: Java Access: The Security Manager
The Class Loader
The Security Manager
The Access Controller
The Policy
The Permission Collection
Summary
Chapter 19: Java Authentication and Authorization Service
What Is JAAS?
Using Authentication
Understanding JAAS Authorization
Summary
Part VI: Enterprise Data Security
Chapter 20: Working with Database Security
Introduction
Connecting Your Database through JDBC
Connecting Your Database through the Connector Architecture
Securing Enterprise Data in the Database
Summary
Part VII: Network Access
Chapter 21: Network Security Architecture
Understanding Network Security
Network Concepts Overview
Firewalls
De-Militarized Zones (DMZs)
Understanding Proxying Firewalls
HTTP Tunneling
Java Sockets
Summary
Chapter 22: SSL and TLS
The Secure Socket Layer (SSL)
The SSL Layers
SSL Sessions and Connections
Security and Attacks
HTTPS: HTTP over SSL
WLS
Summary
Chapter 23: Java Secure Socket Extension
JSSE Architecture
Summary
Part VIII: Public Key Management
Chapter 24: Java Digital Certificates
Introduction to Digital Certificates
A Quick Overview of X.500
The X.509 Specification
Certificate Revocation
Summary
Chapter 25: PKI Management
Certificate Chaining
X.500
LDAP
Certificate Components
Certificate Path Validation
Non-repudiation
Summary
Part IX: Enterprise Access
Chapter 26: Java Enterprise Security and Web Services Security
Introduction
Java Security Models
Java Permissions
Enterprise Component Models
Understanding Web Services
Summary
Chapter 27: Securing Client-Side Components
Exploring Java Directory Services
Using Authentication
Using Access Control
Working with Client-Side Security
Using Servlets
Using Java Server Pages
Client-Side Code Example
Summary
Chapter 28: Securing Server-Side Components
Introduction
Securing Your Enterprise with CORBA
RMI
Enterprise Security with EJBs
Server-side code example
Summary
Chapter 29: Application Security with Java
BEA s WebLogic Basics
IBM s WebSphere Basics
Borland s Enterprise Server Basics
Summary
Index
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index J
Index K
Index L
Index M
Index N
Index O
Index P
Index Q-R
Index S
Index T
Index U
Index V
Index W
Index X-Y-Z
List of Figures
List of Tables
List of Listings
Java Security Solutions
ISBN: 0764549286
EAN: 2147483647
Year: 2001
Pages: 222
Authors:
Rich Helton
,
Johennie Helton
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
Summary
Key Terms and Concepts
Nomenclature and Key Concepts
Appendix B. UNIX Error Messages
D.3. Generating Profile Data
Software Configuration Management
A Practical Approach to Documentation and Configuration Status Accounting
Metrics and Configuration Management Reference
Appendix G Sample Inspection Plan
Appendix P Project Statement of Work
Appendix Y Supplier CM Market Analysis Questionnaire
Building Web Applications with UML (2nd Edition)
Discussion
Building Web Applications
The Artifacts
Implementation
Sample Screen Shots
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The Microsoft Client Library for AJAX
The Pulsing Heart of ASP.NET AJAX
Partial Page Rendering
The AJAX Control Toolkit
Remote Method Calls with ASP.NET AJAX
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 110 Requirements for Electrical Installations
Article 330 Metal-Clad Cable Type MC
Article 353 High Density Polyethylene Conduit Type HDPE Conduit
Article 424: Fixed Electric Space Heating Equipment
Article 702 Optional Standby Systems
Microsoft WSH and VBScript Programming for the Absolute Beginner
Overview of the Windows Script Host
Using the Windows Registry to Configure Script Settings
Combining Different Scripting Languages
Appendix B Built-In VBScript Functions
Appendix C Whats on the CD-ROM?
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies