AnyBook4Less.com
Find the Best Price on the Web
Order from a Major Online Bookstore
Developed by Fintix
Home  |  Store List  |  FAQ  |  Contact Us  |  
 
Ultimate Book Price Comparison Engine
Save Your Time And Money

Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition)

Please fill out form in order to compare prices
Title: Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition)
by Li Gong, Gary Ellison, Mary Dageforde
ISBN: 0-201-78791-1
Publisher: Addison-Wesley Pub Co
Pub. Date: 27 May, 2003
Format: Paperback
Volumes: 1
List Price(USD): $44.99
Your Country
Currency
Delivery
Include Used Books
Are you a club member of: Barnes and Noble
Books A Million Chapters.Indigo.ca

Average Customer Rating: 3.73 (11 reviews)

Customer Reviews

Rating: 5
Summary: Required reading for anyone planning to use the Java SA
Comment: This book provides comprehensive coverage of the Java Security Architecture.

As with all good security books, this one begins with an introduction to the fundamentals of computer and network security. For those new to Java security, there is also brief intro to security of the Java language and platform. The book quickly gets into the details of the new Security Architecture, with a detailed description of what is there, why it is there and how to use it. Sections on deploying and customizing the SA are of practical use to anyone in this situation. The book also contains a concise and useful discussion of object security and how to go about getting it. There is a detailed discussion of the Java Cryptography Architecture, a must if you plan on using the cryptographic functionality. The book concludes with a thought-provoking section on future directions. This book stands out because of the insightful discussions on why design decisions were made and the implications of these decisions. This makes the book interesting reading even if you aren't going to implement the SA in the immediate future. If you are planning on implementing the SA, don't do it without this book within grabbing distance.

Rating: 2
Summary: An impenetrable treatment of a complex subject
Comment: The Java 2 security APIs are large, complex, and quite difficult to understand (in fact, their complexity makes me very much afraid that their use will lead to widespread security problems in deployed Java applications, as application writers and site administrators are going to have a hard time keeping track of everything).

Unfortunately, this book provides a difficult and dense coverage of Java 2 security. While it is doggedly thorough in its treatment of the security APIs, it does not ease the task of "pulling it all together" for the reader; if your understanding of Java 2 security is fragmentary when you start reading this book, it will not feel any more coherent when you are done.

Much of the book has the feel of a "laundry list" to me; it reads as if the author felt he had to enumerate absolutely every security feature in Java 2. The result is that sections that are likely to be of marginal interest to most readers, such as PKI certificate management, receive about the same amount of coverage as subtle and important topics such as domain handling and permission checking.

The prose in this book is simply leaden; on a number of occasions, I found myself having to read a paragraph several times, simply to figure out what the author was trying to say.

While this book is invaluable for the information it contains (I will grant that it is much easier to navigate than Sun's security web pages), it is a great disappointment to me.

Rating: 5
Summary: Go and buy this book
Comment: If you are new to Java, then you shouldn't buy this book.
If you are new to security, then you shouldn't buy this book.
If you prefer loads of examples instead of dense and precise explanations, then you shouldn't buy this book.
If you are looking for a pictorial guide on Java security, then you would probably have to go somewhere else as well.

However...

If you know your Java basics,
If you like completeness,
If you like preciseness,
If you want to know why the APIs look the way they do,
If you take nothing for granted,
If you want an update on latest changes,
If you like things to be drawn in a historical perspective,
If you want a book that you can pick up and read a chapter without having to go through it in a linear way,
If you are serious about security,
In that case you should now pick up your coat, and run to the nearest bookstore to buy this book.

The only thing I found odd in this book is the introduction into security, covering a discussion in general, and an overview of different types of security and access control models. The weird thing is that it introduces a lot of concepts, without actually refering to any of them in the chapters later on.

Similar Books:

Title: Java Security (2nd Edition)
by Scott Oaks
ISBN: 0596001576
Publisher: O'Reilly & Associates
Pub. Date: 01 May, 2001
List Price(USD): $44.95
Title: Core J2EE Patterns: Best Practices and Design Strategies, Second Edition
by Deepak Alur, Dan Malks, John Crupi
ISBN: 0131422464
Publisher: Pearson Education
Pub. Date: 10 June, 2003
List Price(USD): $49.99
Title: Effective Java Programming Language Guide
by Joshua Bloch
ISBN: 0201310058
Publisher: Addison-Wesley Pub Co
Pub. Date: 05 June, 2001
List Price(USD): $39.99
Title: J2EE Security for Servlets, EJBs, and Web Services
by Pankaj Kumar
ISBN: 0131402641
Publisher: Prentice Hall PTR
Pub. Date: 29 August, 2003
List Price(USD): $49.99
Title: Java Development With Ant
by Erik Hatcher, Steve Loughran
ISBN: 1930110588
Publisher: Manning Publications
Pub. Date: August, 2002
List Price(USD): $44.95

Thank you for visiting www.AnyBook4Less.com and enjoy your savings!

Copyright� 2001-2021 Send your comments

Powered by Apache