Java Security Solutions [Helton & Helton 2002-09-05].pdf

(8350 KB) Pobierz
Java Security Solutions
Rich Helton and Johennie Helton
Published by
Wiley Publishing, Inc.
10475 Crosspoint Boulevard
Indianapolis, IN 46256
www.wiley.com
Copyright © 2002 by Wiley Publishing, Inc., Indianapolis, Indiana
Published simultaneously in Canada
Library of Congress Control Number:
2002107908
ISBN: 0-7645-4928-6
Manufactured in the United States of America
10 9 8 7 6 5 4 3 2 1
1B/RV/QY/QS/IN
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any
means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under
Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the
Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center,
222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4744. Requests to the Publisher for
permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd.,
Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4447, E-Mail:
permcoordinator@wiley.com.
Limit of Liability/Disclaimer of Warranty:
While the publisher and author have used their best efforts in
preparing this book, they make no representations or warranties with respect to the accuracy or completeness
of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a
particular purpose. No warranty may be created or extended by sales representatives or written sales
materials. The advice and strategies contained herein may not be suitable for your situation. You should
consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of
profit or any other commercial damages, including but not limited to special, incidental, consequential, or other
damages.
For general information on our other products and services or to obtain technical support, please contact our
Customer Care Department within the U.S. at (800) 762-2974, outside the U.S. at (317) 572-3993 or fax (317)
572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be
available in electronic books.
Trademarks:
Wiley, the Wiley Publishing logo and related trade dress are trademarks or registered trademarks
of Wiley Publishing, Inc., in the United States and other countries, and may not be used without written
permission. Java is a trademark or registered trademark of Sun Microsystems, Inc. All other trademarks are the
property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor
mentioned in this book.
About the Authors
Rich and Johennie Helton are a husband and wife team whose collective experience in the computer industry
spans over 30 years. Together their work history covers most of the facets of the software development life
cycle. Their focus has been security as it applies to networks, applications, and enterprise solutions. The
Heltons operate a consulting firm known as RichWare, LLC (
www.richware.com
).
Rich Helton
's career in computers and security spans over 20 years. His early interest was in amateur radio.
During the 80s he joined the Air Force, and he spent most of the decade in Frankfurt, Germany, working with
computers and secured communications. After serving in the Air Force, Rich was offered a consulting position
at OmniPoint Data Corp, where he helped the inventors of wireless PCS communications. He finished his
MSCS in computer communications at the University of Colorado. He has enjoyed many consulting positions
over the past 12 years, specializing in network security, protocols, and architecture for many companies. His
experience includes building Secure NFS, secure Internet and Intranets, building monitoring software for
enterprise communications and many distributed products. He has served as lead Java architect specializing in
security in such industries as brokerage, financial, telecommunications, and logistics. He is a Sun Certified
Java Programmer and Developer. He is also BEA WebLogic 6.0 Developer Certified. Rich is a co-author of
BEA WebLogic Server Bible [Wiley Technology Publishing, 2002].
Johennie Helton
is a systems architect specializing in J2EE technologies. Her professional life has included
design, development, and software consulting in numerous n-tier distributed solutions for the automobile,
financial, healthcare, retail, and coupon industries. During her career she has focused on leading-edge
technologies. She has a strong background in object-oriented analysis, design and implementation, databases,
application modeling, and hypermedia systems. She has helped companies move to Java and has
experienced firsthand the needs and realities of providing a secure solution to the enterprise. She has a MSCS
from the University of Colorado, and she is a contributing author to Java Data Access: JDBC, JNDI, and JAXP
[Wiley Technology Publishing, 2002].
Credits
Executive Editor
Chris Webb
Senior Acquisitions Editor
Grace Buechlein
Project Editor
Sharon Nash
Technical Editors
Ashutosh Bhonsle
David Wall
Greg Wilcox
Copy Editor
Kim Cofer
Editorial Manager
Mary Beth Wakefield
Vice President & Executive Group Publisher
Richard Swadley
Vice President and Executive Publisher
Bob Ipsen
Vice President and Publisher
Joseph B. Wikert
Executive Editorial Director
Mary Bednarek
Project Coordinator
Maridee Ennis
Proofreading
Kim Cofer
Indexing
Johnna VanHoose Dinse
For Ashley and Courtney
Table of Contents
Java Security Solutions
Preface
Part I - Introduction to Security
Chapter 1
Chapter 2
Chapter 3
- Security Basics
- Hackers and Their Tools
- Java Security Components
Part II - Identity and Authentication
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
- Key Management Algorithms
- Elliptic Curve Cryptography
- Key Management Through the Internet Protocol
- Implementing Keys with Java
- Java Implementation of Key Management
Part III - Data Integrity
Chapter 9
- Ensuring Data Integrity
Chapter 10
- Ensuring Message Authentication
Chapter 11
- Signature Integrity
Part IV - Data Hiding
Chapter 12
- Understanding Ciphers
Chapter 13
- Extending New Ciphers with the JDK
Chapter 14
- Applying Ciphers
Part V - Resource Access Using Java
Chapter 15
- Securing Enterprise Resources
Chapter 16
- Java Authentication and Authorization Through Kerberos
Chapter 17
- Securing Messages with the Java GSS-API
Chapter 18
- Java Access: The Security Manager
Chapter 19
- Java Authentication and Authorization Service
Part VI - Enterprise Data Security
Chapter 20
- Working with Database Security
Part VII - Network Access
Chapter 21
- Network Security Architecture
Chapter 22
- SSL and TLS
Chapter 23
- Java Secure Socket Extension
Part VIII - Public Key Management
Chapter 24
- Java Digital Certificates
Chapter 25
- PKI Management
Part IX - Enterprise Access
Chapter 26
- Java Enterprise Security and Web Services Security
Chapter 27
- Securing Client-Side Components
Chapter 28
- Securing Server-Side Components
Chapter 29
- Application Security with Java
Index
List of Figures
List of Tables
List of Listings
Zgłoś jeśli naruszono regulamin