Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition)

Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition)

List Price: $44.99
Your Price: $38.61
Product Info Reviews

<< 1 2 >>

Rating: 1 stars
Summary: Thoroughly Disappointing
Review: A work of exceptionally poor quality - an editorial disaster that is an insult to the reader. To date, the Java Series has been very impressive indeed. The otherwise outstanding team at Sun is let down very badly by this effort.

Rating: 2 stars
Summary: Some good coverage with problems
Review: For someone who is trying to get a grasp of a complicated subject, this books is too difficult to read. The author's numerous citations were impressive, but again I thought got in the way of the subject. The book needs real world examples. To make matters worse, there were a number of errors, especially with the illustrations, which made it even more difficult to follow.

Rating: 4 stars
Summary: Not an easy read, but well worth the effort
Review: I'm not surprised this book has drawn so many negative reviews. This book is indeed difficult to digest but then the Java Security model itself is rich, subtle and takes time to master. The book does an admirable job of explaining the motivation behind the complete overhaul of the Java 1.1 security architecture, the Java 2 security API design nuances, the flexibility of the fine-grained access-control model in Java 2 and how the backward compatibility concerns with code written with 1.1 style security checks were addressed in the new design. The book also has an intersting chapter addressing security needs of objects in transit (RMI) and a short chapter on cryptography, which anyway is a vast subject in its own right. The key chapters to read are the 3,4 and 5, especially for people who have some background in Java 2 security.

On the negative side, I have to say, the book is inconsistent in parts - I have trouble believing that Li Gong wrote the entire book himself. It's amazing to see chapters discussing at length how you install Java 2, change your CLASSPATH on different platforms etc. while in the same book elsewhere, you see terse, packed explanations about how the classloader hierarchy works in 1.2 or how the basic access control algorithm is extended for privileged operations and some very concise but useful discussions about possible design alternatives in the core library itself. The code samples are very insightful in that they illustrate the workings of some of the core library classes itself with the new security infrastrucure and not some toy samples. However, this also makes the book an unlikely candidate for gleaning ready to use code samples from, which means, if you are looking for how to's and not whys this is probably not the book for you, you might want to consider the Oreilly book.

For people well experienced in Java and OO design, if you want to learn insights about why the security apis are designed the way they are, you might well consider giving this book multiple reads. It's well worth the effort.

In short, this is a difficult but good book. Hopefully, in subsequent editions Li Gong would work on making it better, and also include more details on interesting new additions like JAAS etc.

Rating: 5 stars
Summary: Guardrails for JDK 1.2
Review: If you are a Java developer, please read this book. It is complete in terms of the security hooks and accurate. It is a great book, deserving of five stars.

Rating: 5 stars
Summary: Guardrails for JDK 1.2
Review: If you are a Java developer, please read this book. It is complete in terms of the security hooks and accurate. It is a great book, deserving of five stars.

Rating: 5 stars
Summary: Go and buy this book
Review: If you are new to Java, then you shouldn't buy this book.
If you are new to security, then you shouldn't buy this book.
If you prefer loads of examples instead of dense and precise explanations, then you shouldn't buy this book.
If you are looking for a pictorial guide on Java security, then you would probably have to go somewhere else as well.

However...

If you know your Java basics,
If you like completeness,
If you like preciseness,
If you want to know why the APIs look the way they do,
If you take nothing for granted,
If you want an update on latest changes,
If you like things to be drawn in a historical perspective,
If you want a book that you can pick up and read a chapter without having to go through it in a linear way,
If you are serious about security,
In that case you should now pick up your coat, and run to the nearest bookstore to buy this book.

The only thing I found odd in this book is the introduction into security, covering a discussion in general, and an overview of different types of security and access control models. The weird thing is that it introduces a lot of concepts, without actually refering to any of them in the chapters later on.

Rating: 5 stars
Summary: This book is a must for anyone interested in Java security.
Review: One of my coworkers asked me today whether I thought a Java based approach to email encryption was sensible; how could he evaluate the merits of the design? I told him the first thing I would do is get Li Gong's book "Inside Java 2 Platform Security," it is the most complete coverage of Java security available, and read it cover to cover. Then we could discuss the problem in depth.

Rating: 2 stars
Summary: An impenetrable treatment of a complex subject
Review: The Java 2 security APIs are large, complex, and quite difficult to understand (in fact, their complexity makes me very much afraid that their use will lead to widespread security problems in deployed Java applications, as application writers and site administrators are going to have a hard time keeping track of everything).

Unfortunately, this book provides a difficult and dense coverage of Java 2 security. While it is doggedly thorough in its treatment of the security APIs, it does not ease the task of "pulling it all together" for the reader; if your understanding of Java 2 security is fragmentary when you start reading this book, it will not feel any more coherent when you are done.

Much of the book has the feel of a "laundry list" to me; it reads as if the author felt he had to enumerate absolutely every security feature in Java 2. The result is that sections that are likely to be of marginal interest to most readers, such as PKI certificate management, receive about the same amount of coverage as subtle and important topics such as domain handling and permission checking.

The prose in this book is simply leaden; on a number of occasions, I found myself having to read a paragraph several times, simply to figure out what the author was trying to say.

While this book is invaluable for the information it contains (I will grant that it is much easier to navigate than Sun's security web pages), it is a great disappointment to me.

Rating: 5 stars
Summary: Required Reading for Java Security
Review: The second edition is the most up-to-date Java security book for j2se v 1.4.x. A must-required reading for Java security platform written by Sun's Java security team. It describes the nuts and bolts in a readable language. Highly recommended.

Rating: 4 stars
Summary: Must Read book
Review: This book gives a fare Idea about the new security model. It gives some what inside view, which might be helpfull when we are developing.

But I have feeling that,this is more like specification


<< 1 2 >>

© 2004, ReviewFocus or its affiliates