Inside Java 2 platform security: architecture, API design, and implementation
Series: The Java Series Security is an integral part of the Java platform; all Java APIs are built on a solid security model. That model has always been stronger than the security of other platforms, never allowing for the proliferation of a large virus such as "Melissa" or "I Love Yo...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | , |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boston
Addison-Wesley
2003
|
Ausgabe: | 2nd ed. |
Schriftenreihe: | The Java series
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/0201787911/?ar |
Zusammenfassung: | Series: The Java Series Security is an integral part of the Java platform; all Java APIs are built on a solid security model. That model has always been stronger than the security of other platforms, never allowing for the proliferation of a large virus such as "Melissa" or "I Love You." Now improved security and robust performance peacefully coexist. This book provides a detailed look into the central workings of the Java security architecture, including coverage of the many v1.4 enhancements. This book reviews multiple security threats, such as Trojan horses and denial of service attacks, and the strategies used to combat them. Students will find a practical guide to the deployment of Java security, as well as tips on how to customize, extend, and refine the core security architecture. In addition, it touches on the evolution of Java security, from the restrictive days of the JDK 1.0 sandbox to the sophisticated security features available in Java 2. The book even includes a list of 11 security bugs found in early versions of Java. |
Beschreibung: | Includes bibliographical references (pages 327-337) and index. - Print version record |
Umfang: | 1 Online-Ressource (xxiii, 356 Seiten) illustrations |
Format: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |
ISBN: | 0201787911 9780201787917 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047342609 | ||
003 | DE-627-1 | ||
005 | 20240228114537.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2003 xx |||||o 00| ||eng c | ||
020 | |a 0201787911 |9 0-201-78791-1 | ||
020 | |a 9780201787917 |9 978-0-201-78791-7 | ||
020 | |a 0201787911 |9 0-201-78791-1 | ||
035 | |a (DE-627-1)047342609 | ||
035 | |a (DE-599)KEP047342609 | ||
035 | |a (ORHE)0201787911 | ||
035 | |a (DE-627-1)047342609 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 21 | |
100 | 1 | |a Gong, Li |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Inside Java 2 platform security |b architecture, API design, and implementation |c Li Gong, Gary Ellison, Mary Dageforde |
250 | |a 2nd ed. | ||
264 | 1 | |a Boston |b Addison-Wesley |c 2003 | |
264 | 2 | |a [Place of publication not identified] |b HathiTrust Digital Library | |
300 | |a 1 Online-Ressource (xxiii, 356 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a The Java series | |
500 | |a Includes bibliographical references (pages 327-337) and index. - Print version record | ||
506 | |f Restrictions unspecified |2 star | ||
520 | |a Series: The Java Series Security is an integral part of the Java platform; all Java APIs are built on a solid security model. That model has always been stronger than the security of other platforms, never allowing for the proliferation of a large virus such as "Melissa" or "I Love You." Now improved security and robust performance peacefully coexist. This book provides a detailed look into the central workings of the Java security architecture, including coverage of the many v1.4 enhancements. This book reviews multiple security threats, such as Trojan horses and denial of service attacks, and the strategies used to combat them. Students will find a practical guide to the deployment of Java security, as well as tips on how to customize, extend, and refine the core security architecture. In addition, it touches on the evolution of Java security, from the restrictive days of the JDK 1.0 sandbox to the sophisticated security features available in Java 2. The book even includes a list of 11 security bugs found in early versions of Java. | ||
538 | |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. | ||
650 | 0 | |a Java (Computer program language) | |
650 | 0 | |a Computer security | |
650 | 4 | |a Java (Langage de programmation) | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer security | |
650 | 4 | |a Java (Computer program language) | |
700 | 1 | |a Ellison, Gary |e MitwirkendeR |4 ctb | |
700 | 1 | |a Dageforde, Mary |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/0201787911/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047342609 |
---|---|
_version_ | 1821494920625520640 |
adam_text | |
any_adam_object | |
author | Gong, Li |
author2 | Ellison, Gary Dageforde, Mary |
author2_role | ctb ctb |
author2_variant | g e ge m d md |
author_facet | Gong, Li Ellison, Gary Dageforde, Mary |
author_role | aut |
author_sort | Gong, Li |
author_variant | l g lg |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047342609 (DE-599)KEP047342609 (ORHE)0201787911 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03055cam a22005172 4500</leader><controlfield tag="001">ZDB-30-ORH-047342609</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114537.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2003 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0201787911</subfield><subfield code="9">0-201-78791-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780201787917</subfield><subfield code="9">978-0-201-78791-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0201787911</subfield><subfield code="9">0-201-78791-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047342609</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047342609</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0201787911</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047342609</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gong, Li</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Inside Java 2 platform security</subfield><subfield code="b">architecture, API design, and implementation</subfield><subfield code="c">Li Gong, Gary Ellison, Mary Dageforde</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2003</subfield></datafield><datafield tag="264" ind1=" " ind2="2"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">HathiTrust Digital Library</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxiii, 356 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The Java series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 327-337) and index. - Print version record</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="f">Restrictions unspecified</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Series: The Java Series Security is an integral part of the Java platform; all Java APIs are built on a solid security model. That model has always been stronger than the security of other platforms, never allowing for the proliferation of a large virus such as "Melissa" or "I Love You." Now improved security and robust performance peacefully coexist. This book provides a detailed look into the central workings of the Java security architecture, including coverage of the many v1.4 enhancements. This book reviews multiple security threats, such as Trojan horses and denial of service attacks, and the strategies used to combat them. Students will find a practical guide to the deployment of Java security, as well as tips on how to customize, extend, and refine the core security architecture. In addition, it touches on the evolution of Java security, from the restrictive days of the JDK 1.0 sandbox to the sophisticated security features available in Java 2. The book even includes a list of 11 security bugs found in early versions of Java.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Java (Computer program language)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Java (Langage de programmation)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Java (Computer program language)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ellison, Gary</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dageforde, Mary</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0201787911/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047342609 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:22:03Z |
institution | BVB |
isbn | 0201787911 9780201787917 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxiii, 356 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Addison-Wesley |
record_format | marc |
series2 | The Java series |
spelling | Gong, Li VerfasserIn aut Inside Java 2 platform security architecture, API design, and implementation Li Gong, Gary Ellison, Mary Dageforde 2nd ed. Boston Addison-Wesley 2003 [Place of publication not identified] HathiTrust Digital Library 1 Online-Ressource (xxiii, 356 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The Java series Includes bibliographical references (pages 327-337) and index. - Print version record Restrictions unspecified star Series: The Java Series Security is an integral part of the Java platform; all Java APIs are built on a solid security model. That model has always been stronger than the security of other platforms, never allowing for the proliferation of a large virus such as "Melissa" or "I Love You." Now improved security and robust performance peacefully coexist. This book provides a detailed look into the central workings of the Java security architecture, including coverage of the many v1.4 enhancements. This book reviews multiple security threats, such as Trojan horses and denial of service attacks, and the strategies used to combat them. Students will find a practical guide to the deployment of Java security, as well as tips on how to customize, extend, and refine the core security architecture. In addition, it touches on the evolution of Java security, from the restrictive days of the JDK 1.0 sandbox to the sophisticated security features available in Java 2. The book even includes a list of 11 security bugs found in early versions of Java. Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. Java (Computer program language) Computer security Java (Langage de programmation) Sécurité informatique Ellison, Gary MitwirkendeR ctb Dageforde, Mary MitwirkendeR ctb |
spellingShingle | Gong, Li Inside Java 2 platform security architecture, API design, and implementation Java (Computer program language) Computer security Java (Langage de programmation) Sécurité informatique |
title | Inside Java 2 platform security architecture, API design, and implementation |
title_auth | Inside Java 2 platform security architecture, API design, and implementation |
title_exact_search | Inside Java 2 platform security architecture, API design, and implementation |
title_full | Inside Java 2 platform security architecture, API design, and implementation Li Gong, Gary Ellison, Mary Dageforde |
title_fullStr | Inside Java 2 platform security architecture, API design, and implementation Li Gong, Gary Ellison, Mary Dageforde |
title_full_unstemmed | Inside Java 2 platform security architecture, API design, and implementation Li Gong, Gary Ellison, Mary Dageforde |
title_short | Inside Java 2 platform security |
title_sort | inside java 2 platform security architecture api design and implementation |
title_sub | architecture, API design, and implementation |
topic | Java (Computer program language) Computer security Java (Langage de programmation) Sécurité informatique |
topic_facet | Java (Computer program language) Computer security Java (Langage de programmation) Sécurité informatique |
work_keys_str_mv | AT gongli insidejava2platformsecurityarchitectureapidesignandimplementation AT ellisongary insidejava2platformsecurityarchitectureapidesignandimplementation AT dagefordemary insidejava2platformsecurityarchitectureapidesignandimplementation |