책 이미지

eBook 미리보기
책 정보
· 제목 : Hacking Exposed J2ee & Java: Developing Secure Web Applications with Java Technology (Paperback) 
· 분류 : 외국도서 > 컴퓨터 > 프로그래밍 언어 > Java
· ISBN : 9780072225655
· 쪽수 : 426쪽
· 출판일 : 2002-09-24
· 분류 : 외국도서 > 컴퓨터 > 프로그래밍 언어 > Java
· ISBN : 9780072225655
· 쪽수 : 426쪽
· 출판일 : 2002-09-24
목차
Part I: J2EE Architecture and Technology Introduction
1: The Java Basics: Security from the Ground Up
2: Introduction to JAAS, JCE, and JSSE
3: J2EE Architecture and Security
Part II: Java Application and Network Security
4: Using Encryption and Authentication to Protect an Application
5: Software Piracy and Code Licensing Schemes
6: The Exposure of Bytecodes
7: Hacking Java Client-Server Applications: Another Tier to Attack
8: Java Network Applications: Potential Security Flaw Attacks
Part III: J2EE Security on the Web and Business Tiers
9: This is .WAR: Exploiting Java Web Tier Components
10: Shaking the Foundation: Web Container Strengths and Weaknesses
11: Java Web Services Security
12: Enterprise Java Beans: Security for the Business Tier
2: Introduction to JAAS, JCE, and JSSE
3: J2EE Architecture and Security
Part II: Java Application and Network Security
4: Using Encryption and Authentication to Protect an Application
5: Software Piracy and Code Licensing Schemes
6: The Exposure of Bytecodes
7: Hacking Java Client-Server Applications: Another Tier to Attack
8: Java Network Applications: Potential Security Flaw Attacks
Part III: J2EE Security on the Web and Business Tiers
9: This is .WAR: Exploiting Java Web Tier Components
10: Shaking the Foundation: Web Container Strengths and Weaknesses
11: Java Web Services Security
12: Enterprise Java Beans: Security for the Business Tier
Part II: Java Application and Network Security
4: Using Encryption and Authentication to Protect an Application
5: Software Piracy and Code Licensing Schemes
6: The Exposure of Bytecodes
7: Hacking Java Client-Server Applications: Another Tier to Attack
8: Java Network Applications: Potential Security Flaw Attacks
Part III: J2EE Security on the Web and Business Tiers
9: This is .WAR: Exploiting Java Web Tier Components
10: Shaking the Foundation: Web Container Strengths and Weaknesses
11: Java Web Services Security
12: Enterprise Java Beans: Security for the Business Tier
5: Software Piracy and Code Licensing Schemes
6: The Exposure of Bytecodes
7: Hacking Java Client-Server Applications: Another Tier to Attack
8: Java Network Applications: Potential Security Flaw Attacks
Part III: J2EE Security on the Web and Business Tiers
9: This is .WAR: Exploiting Java Web Tier Components
10: Shaking the Foundation: Web Container Strengths and Weaknesses
11: Java Web Services Security
12: Enterprise Java Beans: Security for the Business Tier
7: Hacking Java Client-Server Applications: Another Tier to Attack
8: Java Network Applications: Potential Security Flaw Attacks
Part III: J2EE Security on the Web and Business Tiers
9: This is .WAR: Exploiting Java Web Tier Components
10: Shaking the Foundation: Web Container Strengths and Weaknesses
11: Java Web Services Security
12: Enterprise Java Beans: Security for the Business Tier
Part III: J2EE Security on the Web and Business Tiers
9: This is .WAR: Exploiting Java Web Tier Components
10: Shaking the Foundation: Web Container Strengths and Weaknesses
11: Java Web Services Security
12: Enterprise Java Beans: Security for the Business Tier
10: Shaking the Foundation: Web Container Strengths and Weaknesses
11: Java Web Services Security
12: Enterprise Java Beans: Security for the Business Tier
12: Enterprise Java Beans: Security for the Business Tier
추천도서
분야의 베스트셀러 >