One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is the in-depth exploration you need.
Java Security, 2nd Edition, focuses on the basic platform features of Java that provide security--the class loader, the bytecode verifier, and the security manager--and recent additions to Java that enhance this security model: digital signatures, security providers, and the access controller. The book covers the security model of Java 2, Version 1.3, which is significantly different from that of Java 1.1. It has extensive coverage of the two new important security APIs: JAAS (Java Authentication and Authorization Service) and JSSE (Java Secure Sockets Extension). Java Security, 2nd Edition, will give you a clear understanding of the architecture of Java's security model and how to use that model in both programming and administration.
The book is intended primarily for programmers who want to write secure Java applications. However, it is also an excellent resource for system and network administrators who are interested in Java security, particularly those who are interested in assessing the risk of using Java and need to understand how the security model works in order to assess whether or not Java meets their security needs.
Scott Oaks is a Java Technologist at Sun Microsystems, where he has worked since 1987. While at Sun, he has specialized in many disparate technologies, from the SunOS kernel to network programming and RPCs. Since 1995, hes focused primarily on Java and bringing Java technology to end-users. Scott also authored OReillys Java Security, Java Threads and Jini in a Nutshell titles.
Our look is the result of reader comments, our own experimentation, and feedback from distribution channels. Distinctive covers complement our distinctive approach to technical topics, breathing personality and life into potentially dry subjects. The animal on the cover of Java Security, Second Edition is a tiger (Panthera tigris). Tigers evolved in eastern Asia; like all carnivores, they descended from civet-like animals called miacids that lived 60 million years ago during the age of the dinosaurs. It is estimated that there were 100,000 tigers living in the wild at the beginning of the 20th century, but today that number has fallen to less than 7,000.
Of the original eight subspecies, the Bali, Caspian, and Javan are now extinct. The five remaining subspecies are the Siberian (also known as Amur, Manchurian, or Northeast China), South China (also known as Amoy or Chinese), Indochinese, Bengal, and Sumatran. Siberian tigers are the largest: males measure up to 10 feet 9 inches long and weigh up to 660 lbs. South China tigers, considered the evolutionary ancestor of all the subspecies, are the most critically endangered. Only 20-30 of these tigers still live in the wild, while 47 more live in zoos in China. Indochinese tigers live in remote areas of southeast Asia, and little is known about them. Bengal tigers are the most populous in the wild; the famous white tiger is a rare variant of this subspecies. Sumatran tigers are the smallest, with males measuring only 8 feet long and weighing approximately 260 lbs on average.
Tigers are the largest cats in the world. They are at the top of the food chain, and prey mainly on elk and wild boars, pigs, deer, and cattle. Tigers can be found in Russia, India, China, and throughout southeast Asia, in habitats ranging from tropical forests to mangrove swamps, tall grass jungles, and the Himalayan mountains and valleys. Their biggest threat is human predators, followed by habitat loss and population fragmentation.
Tigers are shy, nocturnal creatures. With the exception of mother tigers and their cubs, they live alone. Each adult male has a territory that usually ranges from about 10-30 square miles and overlaps the territories of several adult females. Females typically raise 1-3 cubs, which stay with her until she has her next litter. Cubs are born blind. They learn to kill at the age of 6 months, and at 15-18 months can hunt for themselves. Tigers move well on land but are also strong swimmers. They have a highly developed sense of smell, and their night vision is six times better than humans. Their stripes provide effective camouflage in grassland and forest environments and, like human fingerprints, each pattern is unique. Colleen Gorman was the production editor and proofreader, and Rachel Wheeler was the copyeditor for Java Security Second Edition. Linley Dolby provided quality control. Seth Maislin and Ellen Troutman-Zaig wrote the index.
Hanna Dyer designed the cover of this book, based on a series design by Edie Freedman. The cover image is a 19th-century engraving from the Dover Pictorial Archive. Emma Colby produced the cover layout with QuarkXPress 4.1 using Adobe's ITC Garamond font.
David Futato designed the interior layout based on a series design by Nancy Priest. The heading font is Bitstream Bodoni, the text font is ITC New Baskerville, and the code font is Constant Willison. The illustrations that appear in the book were produced by Robert Romano and Jessamyn Read using Macromedia FreeHand 9 and Adobe Photoshop 6. This colophon was written by Rachel Wheeler.
Whenever possible, our books use a durable and flexible lay-flat binding. If the page count exceeds this binding's limit, perfect binding is used.