Flylib.com
Java Security Solutions
Java Security Solutions
ISBN: 0764549286
EAN: 2147483647
Year: 2001
Pages: 222
Authors:
Rich Helton
,
Johennie Helton
BUY ON AMAZON
Java Security Solutions
Table of Contents
Preface
Why Java?
What You Need to Know
How This Book Is Organized
Conventions Used in this Book
Companion Web Site
Contacting the Authors
Acknowledgments
Part I: Introduction to Security
Chapter 1: Security Basics
Introduction
Protecting Your Information in Today s World
The Four Pillars of Security
Mapping Security Features to the Digital World
Summary
Chapter 2: Hackers and Their Tools
Introduction
Looking for the Hack
Different Types of Hacks and How They Work
Understanding Network Attacks
Protecting Against Hackers
Summary
Chapter 3: Java Security Components
Categorizing Security Elements
Categorizing Security Components in Java
How Do the Components Fit Together?
Summary
Part II: Identity and Authentication
Chapter 4: Key Management Algorithms
Understanding the Purpose of Keys
Understanding the Mathematics
Symmetric versus Asymmetric Keys
The Diffie-Hellman Key Exchange
The Rivest, Shamir, and Adleman Key Exchange
The Future of Key Exchanges
Summary
Chapter 5: Elliptic Curve Cryptography
Understanding the Mathematics of ECC
The ECCDH Key Exchange
Summary
Chapter 6: Key Management Through the Internet Protocol
The Internet Protocol Security Protocol
The Simple Authentication and Security Layer
Summary
Chapter 7: Implementing Keys with Java
Introduction
Understanding DSA: The Digital Signature Algorithm
Generating Key Pairs with Java
Generating the Secret Key with Java
Summary
Chapter 8: Java Implementation of Key Management
KeyStore
PKCS 12 KeyStore
Truststore
TrustManager
Policy File
Policytool
Summary
Part III: Data Integrity
Chapter 9: Ensuring Data Integrity
Understanding the Hash Function
Understanding the Message Digest
Understanding the Different Message Digest Algorithms
Implementing the Different Message Digest Algorithms in Java
Summary
Chapter 10: Ensuring Message Authentication
Understanding the MAC
Implementing the MAC
Summary
Chapter 11: Signature Integrity
Understanding the Digital Signature Algorithm (DSA)
Understanding the RSA Digital Signature Algorithm
Understanding the Elliptic Curve Digital Signature Algorithm
Implementing the Digital Signature Algorithm (DSA)
Summary
Part IV: Data Hiding
Chapter 12: Understanding Ciphers
Understanding Symmetric Ciphers
Implementing RSA Public Key Encryption
Some Security Suggestions
Summary
Chapter 13: Extending New Ciphers with the JDK
Implementing a CipherSpi
Implementing the RC4 Stream Cipher
Summary
Chapter 14: Applying Ciphers
Understanding PBE
Understanding Blowfish
Some Implementations in Ciphers
Java Smart Card Basics
Summary
Part V: Resource Access Using Java
Chapter 15: Securing Enterprise Resources
Common Criteria for Security Systems
Understanding Your Security Needs
Fulfilling Your Security Requirements
Summary
Chapter 16: Java Authentication and Authorization Through Kerberos
Introduction to Kerberos
Principal Names and Key Distribution Center
The Kerberos Authenticator
The Kerberos Principal Database
Java Kerberos
Summary
Chapter 17: Securing Messages with the Java GSS-API
Implementing the GSS with Initiators and Acceptors
Authenticating with JAAS
Summary
Chapter 18: Java Access: The Security Manager
The Class Loader
The Security Manager
The Access Controller
The Policy
The Permission Collection
Summary
Chapter 19: Java Authentication and Authorization Service
What Is JAAS?
Using Authentication
Understanding JAAS Authorization
Summary
Part VI: Enterprise Data Security
Chapter 20: Working with Database Security
Introduction
Connecting Your Database through JDBC
Connecting Your Database through the Connector Architecture
Securing Enterprise Data in the Database
Summary
Part VII: Network Access
Chapter 21: Network Security Architecture
Understanding Network Security
Network Concepts Overview
Firewalls
De-Militarized Zones (DMZs)
Understanding Proxying Firewalls
HTTP Tunneling
Java Sockets
Summary
Chapter 22: SSL and TLS
The Secure Socket Layer (SSL)
The SSL Layers
SSL Sessions and Connections
Security and Attacks
HTTPS: HTTP over SSL
WLS
Summary
Chapter 23: Java Secure Socket Extension
JSSE Architecture
Summary
Part VIII: Public Key Management
Chapter 24: Java Digital Certificates
Introduction to Digital Certificates
A Quick Overview of X.500
The X.509 Specification
Certificate Revocation
Summary
Chapter 25: PKI Management
Certificate Chaining
X.500
LDAP
Certificate Components
Certificate Path Validation
Non-repudiation
Summary
Part IX: Enterprise Access
Chapter 26: Java Enterprise Security and Web Services Security
Introduction
Java Security Models
Java Permissions
Enterprise Component Models
Understanding Web Services
Summary
Chapter 27: Securing Client-Side Components
Exploring Java Directory Services
Using Authentication
Using Access Control
Working with Client-Side Security
Using Servlets
Using Java Server Pages
Client-Side Code Example
Summary
Chapter 28: Securing Server-Side Components
Introduction
Securing Your Enterprise with CORBA
RMI
Enterprise Security with EJBs
Server-side code example
Summary
Chapter 29: Application Security with Java
BEA s WebLogic Basics
IBM s WebSphere Basics
Borland s Enterprise Server Basics
Summary
Index
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index J
Index K
Index L
Index M
Index N
Index O
Index P
Index Q-R
Index S
Index T
Index U
Index V
Index W
Index X-Y-Z
List of Figures
List of Tables
List of Listings
Java Security Solutions
ISBN: 0764549286
EAN: 2147483647
Year: 2001
Pages: 222
Authors:
Rich Helton
,
Johennie Helton
BUY ON AMAZON
CISSP Exam Cram 2
A Note from Series Editor Ed Tittel
We Want to Hear from You!
Equipment Life Cycle
Access-Control Systems and Methodology
Applications and Systems-Development Security
FileMaker Pro 8: The Missing Manual
Beyond Text: Container Fields
Bringing It All Together
Auto-Enter Calculations
Exporting a File
Developer Utilities
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
General Structure of Client Applications
Indexing Custom Data Types
Summary
Client 3An Interactive Query Processor
Internationalization and Localization
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 23. Explore David Rumseys Historical Maps
Hack 34. Map Other Planets
Hack 45. Extract a Spatial Model from Wikipedia
Hack 55. Use Your Track Memory as a GPS Base Map
Hack 70. Import Your GPS Waypoints and Tracklogs into GRASS
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
Partial Page Rendering
Built-in Application Services
Remote Method Calls with ASP.NET AJAX
Building AJAX Applications with ASP.NET
GO! with Microsoft Office 2003 Brief (2nd Edition)
You and GO!
Problem Solving Assessments
Objective 2. Use a Form to Add and Delete Records
You and GO!
Project 4A. Weekly Sales
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies