O'Reilly logo

J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice by Pankaj Kumar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Further Reading

Most of the material in this chapter is drawn from the author's own experiments and on the documentation and other information available with J2SE SDK. Besides the tutorial, guides and Javadocs available with J2SE SDK, the book Java Security by Scott Oaks is a good read for comprehensive reference information on most of the APIs and configuration files covered in this chapter.

A good presentation on Java bytecode security model at the JVM level, originally made at Blackhat Briefings 2002, Las Vegas, by Marc Schönefeld, exists at http://www.illegalaccess.de/blackhat/blackhat.pdf. Though of little interest to an application developer, it contains a fairly detailed description of byte code security issues.

There is a good discussion ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required