O'Reilly logo

J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice by Pankaj Kumar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 1. A Security Primer

Securing computer and network systems, along with the information and the knowledge therein, is as important as, if not more than, protecting other forms of assets such as buildings, roads, consignments, trade secrets, and confidential information critical to the functioning of businesses and governments. News headlines of high profile electronic security attacks and many surveys of corporate IT (Information Technology)[1] security staff confirm that the incidence of electronic attacks is on the rise and is having significant adverse impact on the government, industry and people.

[1] Information Technology is a fuzzy term used for technologies to process, store and transport information in digital form.

A number of ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required