Skip to Main Content
Enterprise Java™ Security: Building Secure J2EE™ Applications
book

Enterprise Java™ Security: Building Secure J2EE™ Applications

by Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin
February 2004
Intermediate to advanced content levelIntermediate to advanced
608 pages
15h 11m
English
Addison-Wesley Professional
Content preview from Enterprise Java™ Security: Building Secure J2EE™ Applications

Chapter 2. Enterprise Network Security and Java Technology

Computer security must be holistic, as attackers concentrate on the weakest links. Therefore, the security of a system that uses Java technology must be reviewed as a whole, following the flow of data and applications and considering the potential for attack at each point. This process applies even more forcefully when many computer systems are connected through a network, as more points are subject to attack.

This chapter describes a number of architectural approaches for enterprises, illustrated with real-life examples. We consider the security implications of these approaches, as well as the effects of using Java technology on the server side.

Firewalls are often touted as a defense against ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Jon Edney, William A. Arbaugh
Malware: Fighting Malicious Code

Malware: Fighting Malicious Code

Ed Skoudis, Lenny Zeltser

Publisher Resources

ISBN: 0321118898Purchase book