Hacking Exposed J2ee & Java: Developing Secure Web Applications with Java Technology
J2EE is the programming language backbone of Web services from Sun Microsystems and other major software developers. This work provides instruction on how to hack proof your applications, common Java attacks, countermeasures and specific case studies. Since open-source solutions continue to gain ground in the application server market, the open-source Jboss application server and the Tomcat Web server is covered in detail in addition to the independent software vendor market leader, BEA WebLogic.
1131593479
Hacking Exposed J2ee & Java: Developing Secure Web Applications with Java Technology
J2EE is the programming language backbone of Web services from Sun Microsystems and other major software developers. This work provides instruction on how to hack proof your applications, common Java attacks, countermeasures and specific case studies. Since open-source solutions continue to gain ground in the application server market, the open-source Jboss application server and the Tomcat Web server is covered in detail in addition to the independent software vendor market leader, BEA WebLogic.
61.0 In Stock
Hacking Exposed J2ee & Java: Developing Secure Web Applications with Java Technology

Hacking Exposed J2ee & Java: Developing Secure Web Applications with Java Technology

Hacking Exposed J2ee & Java: Developing Secure Web Applications with Java Technology

Hacking Exposed J2ee & Java: Developing Secure Web Applications with Java Technology

Paperback

$61.00 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

J2EE is the programming language backbone of Web services from Sun Microsystems and other major software developers. This work provides instruction on how to hack proof your applications, common Java attacks, countermeasures and specific case studies. Since open-source solutions continue to gain ground in the application server market, the open-source Jboss application server and the Tomcat Web server is covered in detail in addition to the independent software vendor market leader, BEA WebLogic.

Product Details

ISBN-13: 9780072225655
Publisher: McGraw-Hill/Osborne Media
Publication date: 09/24/2002
Series: Hacking Exposed
Pages: 426
Product dimensions: 7.53(w) x 9.29(h) x 0.95(d)

Table of Contents

Acknowledgmentsxiii
Introductionxv
Case Studyxxi
Part IJ2EE Architecture and Technology Introduction
1The Java Basics: Security from the Ground Up3
Java Then and Now4
Java Language Architecture5
The Java Virtual Machine5
An Interpreted Language: Java Bytecodes6
The Java Class Loader and Built-in Security6
Other Language Features7
Java Security Architecture7
Protection Domains8
Security Controls for Java Class Loading10
Java Permissions12
Java Security Policies13
The Java Security Properties File14
The Java Security Policy File15
Security Manager Checking18
Java Principals and Subjects19
Summary20
2Introduction to JAAS, JCE, and JSSE21
Java Authentication and Authorization Services (JAAS)22
JAAS Architecture23
JAAS Authentication24
JAAS Authorization38
Java Encryption41
Encryption Fundamentals41
Java Cryptography Extension (JCE)43
The Keytool Utility46
Java Secure Sockets Extension (JSSE)48
SSL Fundamentals48
Library and Certificate Installation49
JSSE Demonstration Program50
Securing JAR Files56
The jarsigner Utility57
The Sealed Directive57
Summary58
3J2EE Architecture and Security59
Middleware and Distributed Software Components60
Middleware Development60
Multitiered Application Development61
The Multitiered Environment62
J2EE Multitiered Technologies63
Web Tier Components: Servlets and JSP65
Servlets65
JSP69
JSP Use70
Business Tier Components: EJBs71
Services Provided by the EJB Container71
Types of EJBs73
EJB Deployment75
Development Roles with J2EE75
EJB Development78
Other J2EE APIs85
EJB Security Architecture87
Principals and Roles87
Declarative Security and Programmatic Security88
System-Level Security89
Security on the Presentation Tier89
Security on the Business Tier92
Defining Security Roles92
Mapping Roles93
Assigning Principals to Roles94
Security for Resources95
Summary97
Part IIJava Application and Network Security
4Using Encryption and Authentication to Protect an Application101
Application Security: The Process102
System-level versus Application-level Security102
Application Security Techniques103
The Dangers of Storing Data Locally104
Summary134
5Software Piracy and Code Licensing Schemes137
The Dangers of Code Misuse138
Another Licensing Strategy147
Secret Key Storage148
Summary156
6The Exposure of Bytecodes157
The Dangers of Reverse-Engineering158
The Dangers of Embedded Strings178
Summary180
7Hacking Java Client-Server Applications: Another Tier to Attack181
The Client-Server Implementation182
The Dangers of A Client-Server Architecture183
Watching the Basket: Application Database Security185
Securing the Database Connection187
Protecting the Client-Tier201
Protecting Applet-based Clients213
Protecting WebStart-based Clients227
Summary233
8Java Network Applications: Potential Security Flaw Attacks235
The Dangers of RMI236
The Original RMI Application236
Encrypting the Account Number and Balance245
Using an SSL Connection between the Client and Server252
Implementing Challenge/Response Authentication257
Using an Authenticated Communications Channel260
The Dangers of Loading Class and JAR Files Remotely274
Summary276
Part IIIJ2EE Security on the Web and Business Tiers
9This is .WAR: Exploiting Java Web Tier Components279
The Sample Application: Web-Enabled281
Implementing our Cache-Control Strategy315
Summary319
10Shaking the Foundation: Web Container Strengths and Weaknesses321
The Effects of Directory Listing322
The Invoker Servlet324
Stealing a Session328
Generating a Server Key331
Enabling HTTPS in Tomcat332
Testing the Installation333
Adding a Transport Guarantee334
Client Certificate Authentication335
Configuring Tomcat to use SSL with Client Authentication336
Container Authentication Using a Client Certificate337
Dealing with Overlapping Application Roles342
Summary345
11Java Web Services Security347
Web Services in Java348
Web Services Technologies349
The Web Services Developer Pack350
The Web Services-Enabled Application Implementation351
The Retirement Web Services Suite: Server Side352
The Retirement Web Services Suite: Client Side355
Web Services Application Vulnerabilities358
Requiring SSL Connections361
Implementing HTTP Authentication366
Disabling WSDL Distribution368
Enabling Programmatic Authorization370
Passing Database Passwords As Context Parameters373
Web Services Workflow Security374
The Future of Web Services Security378
SOAP Security Extensions: Digital Signature378
WS-Security379
Summary380
12Enterprise Java Beans: Security for the Business Tier381
The EJB Application Implementation382
The EJB Persistence Service383
The Get and Set Balance Methods384
The Beans385
EJB Application Vulnerabilities389
Common Pitfalls When Using Message-Driven Beans400
The Message-Driven Bean Implementation401
Summary411
Index413
From the B&N Reads Blog

Customer Reviews