دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
دسته بندی: امنیت ویرایش: 2nd نویسندگان: Gary McGraw. Ed W. Felten سری: ISBN (شابک) : 047131952X, 9780471319528 ناشر: Wiley سال نشر: 1999 تعداد صفحات: 319 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 2 مگابایت
در صورت تبدیل فایل کتاب Securing Java: Getting Down to Business with Mobile Code به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب امن سازی جاوا: کار با کد موبایل نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
کارشناسان برجسته جاوا به برنامه نویسان و توسعه دهندگان نشان می دهند که چگونه از آسیب پذیری ها محافظت کنند و امنیت وب را تضمین کنند. این کتاب به طور کامل قابلیتها و معایب مدل امنیتی جدید JDK 1.2 را بررسی میکند و پوشش حیاتی امنیت کارت هوشمند ActiveX، تصحیح وب، انتقال از TCB به "غیر اعتماد کامل" و موارد دیگر را اضافه میکند.
Leading experts in Java show programmers and developers how to guard against vulnerabilities and ensure Web security. The book thoroughly examines the capabilities and flaws of the new JDK 1.2 security model and adds vital coverage of ActiveX Smart Card security, Web proofing, transitioning from TCB to "complete untrust", plus much more.
Cover Title About the Web Edition Table of Contents Preface Acknowledgments Chapter 1. Mobile Code and Security: Why Java Security is Important 1.1 – Who Cares? 1.2 – Mobile Code 1.3 – The Power of Networking 1.4 – Downloading Code: Not a New Problem 1.5 – Java in a Demitasse 1.6 – Securing Java 1.7 – How Does Java Security Stack Up? 1.8 – Where to Find More Information on Java 1.9 – Mobile Code Has Its Price 1.10 – Assessing the Risks Chapter 2. The Base Java Security Model: The Original Applet Sandbox 2.1 – Potential Threats 2.2 – What Untrusted Java Code Can't Do 2.3 – What Untrusted Java Code Can Do 2.4 – The Java Language and Security 2.5 – The Three Parts of the Default Sandbox 2.6 – The Verifier 2.7 – The Class Loader Architecture 2.8 – The Security Manager 2.9 – Different Classes of Security 2.10 – Type Safety 2.11 – Browser-Specific Security Rules 2.12 – The Fundamental Tradeoff 2.13 – Is There Really a Java Security Policy? Chapter 3. Beyond the Sandbox: Signed Code in JDK 1.2 3.1 – What's the Main Goal? 3.2 – Security Enhancements in JDK 1.1 3.3 – Signed Code 3.4 – Trust 3.5 – An Introduction to Java 2 Security 3.6 – Access Control and Stack Inspection 3.7 – New Security Mechanisms in Sun's Java 2 3.8 – Outside the Sandbox Chapter 4. Malicious Applets: Avoiding the Common Nuisances 4.1 – What Is a Malicious Applet? 4.2 – Annoying Applets 4.3 – Denial of Service 4.4 – Opening Untrusted Windows 4.5 – Stealing Cycles 4.6 – Forging Mail 4.7 – Killing Off the Competition 4.8 – Malicious Applets on the Web 4.9 – The Implications Chapter 5. Attack Applets: Exploiting Holes in the Security Model 5.1 – Implementation Errors or Specification Errors? 5.2 – Attack Applets 5.3 – What Applets Aren't Supposed to Do 5.4 – A Chronology of Problems 5.5 – Jumping the Firewall 5.6 – Slash and Burn 5.7 – You're Not My Type 5.8 – Applets Running Wild 5.9 – Casting Caution to the Wind 5.10 – Tag-Team Applets 5.11 – Big Attacks Come in Small Packages 5.12 – Steal This IP Number 5.13 – Cache Cramming 5.14 – Virtual Voodoo 5.15 – The Magic Coat 5.16 – Verifying the Verifier 5.17 – The Vacuum Bug 5.18 – Look Over There 5.19 – Beat the System 5.20 – What These Problems Teach Us Chapter 6. Securing Java: Improvements, Solutions, and Snake Oil 6.1 – Improving the Platform 6.2 – Writing Safer Code: A Defensive Stance 6.3 – Third-Party Solutions or Snake Oil? 6.4 – Risks That Third-Party Vendors Can Address 6.5 – Risks That Third-Party Vendors Can't Address 6.6 – Assess Your Risks Chapter 7. Java Security Guidelines: Developing and Using Java More Securely 7.1 – Guidelines for Java Developers 7.2 – Guidelines for Java Users 7.3 – Guidelines Are Never Perfect Chapter 8. Java Card Security: How Smart Cards and Java Mix 8.1 – Java Security Goes Both Ways 8.2 – What Is a Smart Card? 8.3 – Why Put Java on a Smart Card? 8.4 – How Can Java Fit on a Card? 8.5 – How Secure Are Smart Cards? 8.6 – What Role Can Smart Cards Play in E-Commerce Systems? 8.7 – How Does the Use of Java Impact Smart Card Security? 8.8 – Managing Risks Chapter 9. The Future of Java Security: Challenges Facing Mobile Code 9.1 – Lessons from the Trenches 9.2 – Challenges for Secure Mobile Code 9.3 – Software Assurance for Java Appendix A. Frequently Asked Questions Appendix B. Java Security Hotlist Appendix C. How to Sign Java Code C.1 – Signing Classes with the Netscape Object Signing Tool C.2 – Signing Java Applets with Microsoft's Authenticode C.3 – Comparing Authenticode to Netscape Object Signing C.4 – Signing Code with Sun's JDK 1.1.x C.5 – Differences Between Netscape Object Signing and JDK 1.1.x javakey C.6 – Signing Code with Sun's Java 2 C.7 – Differences between JDK 1.1 Code Signing and Java 2 Code Signing C.8 – In Conclusion