Rating:  Summary: great book ... Review: Excuse me, but my previous review was intended for "Java Threads" by Scott Oaks, not "Java Security".However, although the "Java Security" book is also of comparable quality, it, unfortunately, doesn't clearly cover the magical art of how dynamically loaded class files are properly integrated with "smart" servers. In other words, how are freshly loaded classes broadcast to the server VM? This "security problem" is a holy grail of the web.
Rating:  Summary: Missing something... Review: I wish he'd have gone over how to implement your own provider. Good thing I got this book free at the JavaOne, otherwise I wouldn't have bought it.
Rating:  Summary: Watch out for the book title Review: If you are looking for information about cryptography and examples on different implementation and usage of the API:s this is not you book. The author goes throught the standard stuff about the classloader and JVM security. There are very little examples and discussion for every day programmer. Most of the examples are for those planning to write their own classloaders and security managers. Furthermore, the areas of Cryptography is poorly covered, most of the text is just method explanation from the API documentation. There are very few examples that you migth be able to use.
Rating:  Summary: Thumbs Up! Review: If you need to work with Java security you need this book. Explanations are clear and to the point. Cover's new 1.2 (oops Java2) security issues in depth. Recomended.
Rating:  Summary: Good if you want to become an expert, not good for how-to. Review: If you wish to become an in-depth expert in Java security, this book is for you. But if you just want to find out how to add specific aspects of Java security to your applications, this book is the long way around the block. It would be better to have some how-to examples early in each chapter, followed by the background and theory of each concept. Instead, you have to figure out "how-to" based on the discussion.
Rating:  Summary: Comprehensive, in-depth and accurate Review: Java Security is a definitive guide. It covers all aspects of security in Java 2 in great depth and with technical accuracy. Be warned however, it is not light reading nor an introdutory book.
Rating:  Summary: Excellent overview of Java security Review: Like the stimulating brew with which it shares its name, Java is a rich programming language that offers vast functionality. Many organizations have prohibited Java from their networks due to its supposed security risks. While Java does, of course, pose risks, such risks exist in every programming language. Anyone interested in taking an honest look at the risks of using Java to see whether it meets security needs should consider Java Security required reading. Author Scott Oaks does an excellent job in showing the deep security functionality afforded by Java, taking the often abstract Java security concepts and explaining them in a clear and understandable style. As a senior software engineer with Sun Microsystems, Oaks has focused on Java for a number of years, and his expertise shows. While directed at Java programmers, the book has significant value for any programmer or system administrator who needs to understand how Java security works. Those who may want to exploit Java's rich blend of features should gulp down this book.
Rating:  Summary: Good Structure Review: One thing for sure that this book is well structured, chapters are properly segregated and closely linked to each other. It makes introduction to java security seems easy.
I used to find java security a bit complicated, got pieces of information from articles that I read, but I ended up having more questions.
Some of the APIs shown in the examples are deprecated for JDK 1.4, but you can easily replace them with the new classes.
Rating:  Summary: great book Review: take a step forward in your mundane java applet development by reading scott's book. his tome is choked full of the kind of details and examples that java server gurus have known since jdk1.1.3. for example, he gives a very workable example of a READ/WRITE lock algorithm for threads competing for objects .. a simple but effective algorithm that competes well with a full blown queue manger. need i say more? his book is one of the best on the market of experienced java coders. anxiously abaiting a real Object/Set database in java ... anocious@popmail.com
Rating:  Summary: Java security from the ground up.....real good stuff Review: The best book on Java security in the market . Assumes that the reader has a fair understanding of Java programming. Provides clear differences between Java 1.1 and Java 2 models . Exhaustive coverage of basic java principles like built in language security features and byte code verification. Good examples on class loaders . Covers various security managers ex AppletSecurity Manager , RMI Security manager . Provides solid foundation for features like code signing , digital signatures , encryption etc. In a nutshell , book for security enthsiasts.
|