
Hacking Exposed J2EE & Java
Developing Secure Web Applications with Java Technology
Art Taylor, Brian Buege, Randy Layman
Résumé
Secure your Java and J2EE applications--from the hackers perspective
Application security is a highly complex topic with new vulnerabilities surfacing every day. Break-ins, fraud, sabotage, and DoS attacks are on the rise, and quickly evolving Java-based technology makes safeguarding enterprise applications more challenging than ever. Hacking Exposed J2EE & Java will show you, step-by-step, how to defend against the latest attacks by understanding the hackers methods and thought processes. Youll gain insight through examples of real-world attacks, both ordinary and sophisticated, and get valuable countermeasures to protect against them. Youll also find an in-depth case study with Java and J2EE security examples and actual working code incorporated throughout the book.
What youll learn:
- The proven Hacking Exposed methodology to locate and
patch vulnerable systems
- How to apply effective security countermeasures to
applications which use the following Java enterprise
technologies:
Servlets and Java Server Pages (JSPs); Enterprise Java Beans (EJBs); Web Services; Applets; Java Web Start; Remote Method Invocation (RMI); Java Message Service (JMS)
- How to design a security strategy that extends
throughout a multi-tiered J2EE architecture using J2SE 1.4
and J2EE 1.3
- What common, but devastating, vulnerabilities exist
within many J2EE applications
- How to use the J2EE security architecture to create
secure J2EE applications
- How to use the Java security APIs, including the Java
Authentication and Authorization Service (JAAS), the Java
Cryptography Extension (JCE), and the Java Secure Socket
Extension (JSSE)
- How to create applications that proactively defend
against malicious users, content manipulation, and other
attacks.
- Valuable tips for hardening J2EE applications based on
the authors expertise
Contents
Part I: Secure Java for the
Enterprise
Ch. 1: Java Security Basics
Ch. 2: Java for the Enterprise: J2EE and
the Web Application
Part II: Java Application Security
Ch. 3: The Malicious Applet and
Friends
Ch. 4: Java Client-Server
Applications
Part III: Java Network Security
Issues
Ch. 5: Java Network Applications:
Potential Security Flaws
Part IV: Java Security on the Web
Tier
Ch. 6: Hacking the Web Site: Exploiting
Java Web Tier Components
Ch. 7: Java Servlets and Java Server
Pages: Security Flaws and Weaknesses
Part V: Java Security on the Business
Tier
Ch. 8: Role Based Security: J2EE Security
Realms
Ch. 9: Controlling Resources
Part VI: Appendices
Appendix A: Example
Application
Appendix B: Firewalls
Appendix C: Operating Systems
Security
Appendix D: Java Security Related
APIs
L'auteur - Art Taylor
ART TAYLOR has served as technical lead on numerous J2EE projects and has taught high-level Java and J2EE courses for Sun Microsystems. Taylor is author of JDBC Developer's Resource (Prentice Hall PTR) and several other books on Java technologies. He has over 17 years' IT experience, most of it focused on database application development.
L'auteur - Brian Buege
Brian Buege has a masters degree in Computer Science and
more than 11 years experience in the computer industry.
Part of that experience was spent in the field of security
planning, secure system development and security training
for the US Army and US Army Reserve. He has taught computer
science and mathematics at the college level, managed large
development projects and computer services departments and
provided Java instruction for Sun Microsystems. He is a
certified Java programmer and developer and a Sun certified
Java instructor.
L'auteur - Randy Layman
Randy Layman has more than 5 years of Java development
experience with a focus on enterprise systems.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Mc Graw Hill |
Auteur(s) | Art Taylor, Brian Buege, Randy Layman |
Parution | 07/01/2003 |
Nb. de pages | 426 |
Format | 19 x 23 |
Couverture | Broché |
Poids | 900g |
Intérieur | Noir et Blanc |
EAN13 | 9780072225655 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Bureautique Réseaux Sécurité
- Informatique Développement d'applications Conception et développement web Serveurs web et serveurs d'application
- Informatique Développement d'applications Langages Java - J2EE Architecture J2EE
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet