Jump to ratings and reviews
Rate this book

Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management (Sun Core Series) 1st edition by Steel, Christopher, Nagappan, Ramesh, Lai, Ray (2005) Paperback

Rate this book
Praise for Core Security Patterns Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in order to meet those requirements. Core Security Patterns addresses both aspects of security and will be a guide to developers everywhere in creating more secure applications. --Whitfield Diffie, inventor of Public-Key Cryptography A comprehensive book on Security Patterns, which are critical for secure programming. --Li Gong, former Chief Java Security Architect, Sun Microsystems, and coauthor of Inside Java 2 Platform Security As developers of existing applications, or future innovators that will drive the next generation of highly distributed applications, the patterns and best practices outlined in this book will be an important asset to your de

Paperback

First published October 24, 2005

2 people are currently reading
40 people want to read

About the author

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
5 (23%)
4 stars
8 (38%)
3 stars
8 (38%)
2 stars
0 (0%)
1 star
0 (0%)
Displaying 1 of 1 review
Profile Image for Walter.
47 reviews1 follower
January 1, 2009
This book provides a comprehensive overview of Java security, including J2EE, J2SE and J2ME, including associated technologies such as SAML, PKI, etc. This is followed by a design patterns catalog describing common security patterns, indications for their use, and their drawbacks. An end-to-end design example is shown. Sample source code is shown illustrating most of the concepts.

The book is very long and is challenging to read cover-to-cover. Its real value is as a reference for when you are faced with specific security problems.
Displaying 1 of 1 review

Can't find what you're looking for?

Get help and learn more about the design.