9780471178422-047117842X-Java Security: Hostile Applets, Holes & Antidotes

Java Security: Hostile Applets, Holes & Antidotes

ISBN-13: 9780471178422
ISBN-10: 047117842X
Edition: 1
Author: Gary McGraw, Edward W. Felten
Publication date: 1996
Publisher: John Wiley & Sons Inc
Format: Paperback 192 pages
FREE US shipping

Book details

ISBN-13: 9780471178422
ISBN-10: 047117842X
Edition: 1
Author: Gary McGraw, Edward W. Felten
Publication date: 1996
Publisher: John Wiley & Sons Inc
Format: Paperback 192 pages

Summary

Java Security: Hostile Applets, Holes & Antidotes (ISBN-13: 9780471178422 and ISBN-10: 047117842X), written by authors Gary McGraw, Edward W. Felten, was published by John Wiley & Sons Inc in 1996. With an overall rating of 3.6 stars, it's a notable title among other books. You can easily purchase or rent Java Security: Hostile Applets, Holes & Antidotes (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.33.

Description

"This book is mandatory reading for every user and developer of webware." —Peter G. Neumann Moderator of the Risks Forum

Do you know how to sort out fact from fiction when it comes to Java security? Did you know that whenever you surf the Web with Netscape or Internet Explorer you are using Java? That means that someone else's code is running untested on your computer. Don't wait for a hostile applet to show you how vulnerable your site is. International security experts Gary McGraw and Edward Felten —leader of the famed Princeton team —tell you how Java security works, and how it doesn't.

McGraw and Felten give you all the information you need to create a reasonable Java use strategy. Java Security gives you:

  • Guidelines for using Java more safely today
  • What to expect in the Java security future
  • A clear treatment of the risks of using Java
  • Vital information explaining the three prongs of the Java security model: the Byte Code Verifier, the Applet Class Loader, and the Security Manager
  • Clear explanations of holes in the Java security model

Whether you're a webmaster, an information technology manager charged with creating an intelligent security policy for your organization, or a concerned Web user, this book is must reading.

visit this book's companion web site at: http://www.rstcorp.com/java-security.html

visit our web site at: Ihttp://www.wiley.com/compbooks/

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book