0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • -
Status
Brand

Showing 1 - 1 of 1 matches in All Departments

Hacking Exposed  - J2EE & Java (Paperback): Art Taylor, Brian Buege, Randy Layman Hacking Exposed - J2EE & Java (Paperback)
Art Taylor, Brian Buege, Randy Layman
R1,374 R1,147 Discovery Miles 11 470 Save R227 (17%) Ships in 18 - 22 working days

Secure your Java and J2EE applications--from the hacker's perspective

Application security is a highly complex topic with new vulnerabilities surfacing every day. Break-ins, fraud, sabotage, and DoS attacks are on the rise, and quickly evolving Java-based technology makes safeguarding enterprise applications more challenging than ever. Hacking Exposed J2EE & Java will show you, step-by-step, how to defend against the latest attacks by understanding the hacker's methods and thought processes. You'll gain insight through examples of real-world attacks, both ordinary and sophisticated, and get valuable countermeasures to protect against them. You'll also find an in-depth case study with Java and J2EE security examples and "actual working code incorporated throughout the book.

What you'll learn: The proven Hacking Exposed methodology to locate and patch vulnerable systems How to apply effective security countermeasures to applications which use the following Java enterprise technologies: Servlets and Java Server Pages (JSPs); Enterprise Java Beans (EJBs); Web Services; Applets; Java Web Start; Remote Method Invocation (RMI); Java Message Service (JMS) How to design a security strategy that extends throughout a multi-tiered J2EE architecture using J2SE 1.4 and J2EE 1.3 What common, but devastating, vulnerabilities exist within many J2EE applications How to use the J2EE security architecture to create secure J2EE applications How to use the Java security APIs, including the Java Authentication and Authorization Service (JAAS), the Java Cryptography Extension (JCE), and the Java Secure Socket Extension (JSSE) How to create applications that proactively defend against malicious users,content manipulation, and other attacks. Valuable tips for hardening J2EE applications based on the authors' expertise

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
A Final Experiment - A Simple, Direct…
Tom Stegeman Paperback R217 R200 Discovery Miles 2 000
A Textbook of Data Structures and…
Vijayalakshmi P Hardcover R3,522 Discovery Miles 35 220
Georgette, Where Are You? - And Other…
Charlotte Poteet Paperback R334 Discovery Miles 3 340
Transaction Processing - Management of…
Seppo Sippu, Eljas Soisalon-Soininen Hardcover R2,550 Discovery Miles 25 500
Tantric Sex - A Beginners Guide with…
Harley Maxwell Hardcover R760 R669 Discovery Miles 6 690
Effective Risk Communication
Joseph Arvai, Louie Rivers III Hardcover R4,632 Discovery Miles 46 320
Preserving Privacy in Data Outsourcing
Sara Foresti Hardcover R2,754 Discovery Miles 27 540
Scandals and Abstraction - Financial…
Leigh Claire La Berge Hardcover R2,726 Discovery Miles 27 260
The Adventures of Tom Sawyer
Mark Twain Book R553 Discovery Miles 5 530
The Palgrave Handbook on Critical…
Ali A. Abdi, Greg William Misiaszek Hardcover R4,132 Discovery Miles 41 320

 

Partners