Flylib.com
Java Security Solutions
Java Security Solutions
ISBN: 0764549286
EAN: 2147483647
Year: 2001
Pages: 222
Authors:
Rich Helton
,
Johennie Helton
BUY ON AMAZON
Java Security Solutions
Table of Contents
Preface
Why Java?
What You Need to Know
How This Book Is Organized
Conventions Used in this Book
Companion Web Site
Contacting the Authors
Acknowledgments
Part I: Introduction to Security
Chapter 1: Security Basics
Introduction
Protecting Your Information in Today s World
The Four Pillars of Security
Mapping Security Features to the Digital World
Summary
Chapter 2: Hackers and Their Tools
Introduction
Looking for the Hack
Different Types of Hacks and How They Work
Understanding Network Attacks
Protecting Against Hackers
Summary
Chapter 3: Java Security Components
Categorizing Security Elements
Categorizing Security Components in Java
How Do the Components Fit Together?
Summary
Part II: Identity and Authentication
Chapter 4: Key Management Algorithms
Understanding the Purpose of Keys
Understanding the Mathematics
Symmetric versus Asymmetric Keys
The Diffie-Hellman Key Exchange
The Rivest, Shamir, and Adleman Key Exchange
The Future of Key Exchanges
Summary
Chapter 5: Elliptic Curve Cryptography
Understanding the Mathematics of ECC
The ECCDH Key Exchange
Summary
Chapter 6: Key Management Through the Internet Protocol
The Internet Protocol Security Protocol
The Simple Authentication and Security Layer
Summary
Chapter 7: Implementing Keys with Java
Introduction
Understanding DSA: The Digital Signature Algorithm
Generating Key Pairs with Java
Generating the Secret Key with Java
Summary
Chapter 8: Java Implementation of Key Management
KeyStore
PKCS 12 KeyStore
Truststore
TrustManager
Policy File
Policytool
Summary
Part III: Data Integrity
Chapter 9: Ensuring Data Integrity
Understanding the Hash Function
Understanding the Message Digest
Understanding the Different Message Digest Algorithms
Implementing the Different Message Digest Algorithms in Java
Summary
Chapter 10: Ensuring Message Authentication
Understanding the MAC
Implementing the MAC
Summary
Chapter 11: Signature Integrity
Understanding the Digital Signature Algorithm (DSA)
Understanding the RSA Digital Signature Algorithm
Understanding the Elliptic Curve Digital Signature Algorithm
Implementing the Digital Signature Algorithm (DSA)
Summary
Part IV: Data Hiding
Chapter 12: Understanding Ciphers
Understanding Symmetric Ciphers
Implementing RSA Public Key Encryption
Some Security Suggestions
Summary
Chapter 13: Extending New Ciphers with the JDK
Implementing a CipherSpi
Implementing the RC4 Stream Cipher
Summary
Chapter 14: Applying Ciphers
Understanding PBE
Understanding Blowfish
Some Implementations in Ciphers
Java Smart Card Basics
Summary
Part V: Resource Access Using Java
Chapter 15: Securing Enterprise Resources
Common Criteria for Security Systems
Understanding Your Security Needs
Fulfilling Your Security Requirements
Summary
Chapter 16: Java Authentication and Authorization Through Kerberos
Introduction to Kerberos
Principal Names and Key Distribution Center
The Kerberos Authenticator
The Kerberos Principal Database
Java Kerberos
Summary
Chapter 17: Securing Messages with the Java GSS-API
Implementing the GSS with Initiators and Acceptors
Authenticating with JAAS
Summary
Chapter 18: Java Access: The Security Manager
The Class Loader
The Security Manager
The Access Controller
The Policy
The Permission Collection
Summary
Chapter 19: Java Authentication and Authorization Service
What Is JAAS?
Using Authentication
Understanding JAAS Authorization
Summary
Part VI: Enterprise Data Security
Chapter 20: Working with Database Security
Introduction
Connecting Your Database through JDBC
Connecting Your Database through the Connector Architecture
Securing Enterprise Data in the Database
Summary
Part VII: Network Access
Chapter 21: Network Security Architecture
Understanding Network Security
Network Concepts Overview
Firewalls
De-Militarized Zones (DMZs)
Understanding Proxying Firewalls
HTTP Tunneling
Java Sockets
Summary
Chapter 22: SSL and TLS
The Secure Socket Layer (SSL)
The SSL Layers
SSL Sessions and Connections
Security and Attacks
HTTPS: HTTP over SSL
WLS
Summary
Chapter 23: Java Secure Socket Extension
JSSE Architecture
Summary
Part VIII: Public Key Management
Chapter 24: Java Digital Certificates
Introduction to Digital Certificates
A Quick Overview of X.500
The X.509 Specification
Certificate Revocation
Summary
Chapter 25: PKI Management
Certificate Chaining
X.500
LDAP
Certificate Components
Certificate Path Validation
Non-repudiation
Summary
Part IX: Enterprise Access
Chapter 26: Java Enterprise Security and Web Services Security
Introduction
Java Security Models
Java Permissions
Enterprise Component Models
Understanding Web Services
Summary
Chapter 27: Securing Client-Side Components
Exploring Java Directory Services
Using Authentication
Using Access Control
Working with Client-Side Security
Using Servlets
Using Java Server Pages
Client-Side Code Example
Summary
Chapter 28: Securing Server-Side Components
Introduction
Securing Your Enterprise with CORBA
RMI
Enterprise Security with EJBs
Server-side code example
Summary
Chapter 29: Application Security with Java
BEA s WebLogic Basics
IBM s WebSphere Basics
Borland s Enterprise Server Basics
Summary
Index
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index J
Index K
Index L
Index M
Index N
Index O
Index P
Index Q-R
Index S
Index T
Index U
Index V
Index W
Index X-Y-Z
List of Figures
List of Tables
List of Listings
Java Security Solutions
ISBN: 0764549286
EAN: 2147483647
Year: 2001
Pages: 222
Authors:
Rich Helton
,
Johennie Helton
BUY ON AMAZON
Beginning Cryptography with Java
Object Description in Cryptography Using ASN.1
Distinguished Names and Certificates
Key and Certificate Management Using Keystores
Appendix A Solutions to Exercises
Appendix C Using the Bouncy Castle API for Elliptic Curve
WebLogic: The Definitive Guide
Using WebLogics RMI
Deployment Considerations
Creating a Custom Authentication Provider
Reliable SOAP Messaging
Monitor MBeans
SQL Hacks
Hack 10. Convert Subqueries to JOINs
Hack 35. Tally Results into a Chart
Hack 48. Prevent an SQL Injection Attack
Hack 66. Use Optimistic Locking
Hack 83. Find the Top n in Each Group
Visual C# 2005 How to Program (2nd Edition)
Introduction
Web Resources
Navigating the Visual Studio 2005 IDE
do...while Repetition Statement
Summary
Microsoft VBScript Professional Projects
Arrays
VBScript and Internet Explorer
Customizing the Start Menu and Quick Launch Toolbar
Collecting Remote Summary Reports
Building the Registration and Configuration Settings Page
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Objects, Interfaces, and Patterns
Printing and Drawing with GDI+
ADO.NET
Web Services
Remoting and Enterprise Services
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies