Summary and Info
Written by members of IBM's software group and research division, this guide explains how various J2EE components are tied into enterprise security and how J2EE applications can take advantage of class loaders, access-control restrictions, the Java cryptography architecture, public key cryptography standards, internet mail extensions, the Java secure socket extension, and web services technology. The book is partially based on articles published in IBM systems journal and IBM developerWorks.
Review and Comments
Rate the Book
Enterprise Java Security: Building Secure J2EE Applications 0 out of 5 stars based on 0 ratings.