O'Reilly logo

J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice by Pankaj Kumar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Further Reading

A representative list of cyber crime cases pursued by the U.S. Department of Justice with background details can be found at their website http://www.usdoj.gov/criminal/cybercrime/cccases.html. Specific news reports are too numerous to be listed individually. You can retrieve most of them (and many more) by entering such keywords as “security breach”, “cyber crime”, “cyber attack” and so on at the search engine http://www.google.com. 2002 CSI/FBI Computer Crime and Security Survey gives a good view of the current state of computer crime and security.

A good introduction to security concepts, especially from the perspective of securing the IT infrastructure of a large organization, can be found in the NIST Security Handbook titled ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required