• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Jeanne Boyarsky
  • Ron McLeod
  • Paul Clapham
  • Liutauras Vilda
Sheriffs:
  • paul wheaton
  • Rob Spoor
  • Devaka Cooray
Saloon Keepers:
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Frits Walraven
  • Tim Moores
Bartenders:
  • Mikalai Zaikin

For the Authors.

 
Ranch Hand
Posts: 74
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
HI

1.How would you compare your book with other books like Pankaj Kumar�s book J2ee Security for Servlets,Ejb�s?
2. Can it be used as a good reference book on J2SE security topics and security aspects of Enterprise Applications Technologies.
or
The main focus is only on security aspects of Enterprise applications technologies (Servlets, EJBs and Web Services)?
Thanks.
 
Author
Posts: 27
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi Anushe,
Here are my answers.
1.How would you compare your book with other books like Pankaj Kumar�s book J2ee Security for Servlets,Ejb�s?
ANSWER: Well, I don't want to be that one who says that his own book is better than others. The truth is that we made a choice when we started to write this book. We really wanted to write a definitive guide to Java security and cover all the hot topics. So we go over Servlets and EJBs, but we do much more than that: we have lots of crypto, Web services, J2EE and J2SE stuff.
2. Can it be used as a good reference book on J2SE security topics and security aspects of Enterprise Applications Technologies.
or
The main focus is only on security aspects of Enterprise applications technologies (Servlets, EJBs and Web Services)?
ANSWER: We covered J2EE and J2SE security in detail. But we covered lots of related topics as well: cryptography, architectures, scenarios, firewalls, etc. So hopefully our book will be a good reference for anybody who needs to work on an enterprise system securely.
Thanks,
Marco Pistoia
 
Ranch Hand
Posts: 4982
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi Marco,


But we covered lots of related topics as well: cryptography, architectures, scenarios, firewalls, etc


How deep does those topics covered? They will be discussed in overview, or in detail, such as algorithms, or?
Thanks.
Nick
 
Ranch Hand
Posts: 83
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
and code examples as well for the latter mentioned techniques ?
 
Ranch Hand
Posts: 8945
Firefox Browser Spring Java
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator

Originally posted by bas duijzings:
and code examples as well for the latter mentioned techniques ?


From the Customer review in amazon, looks like there are less sample code.
http://www.amazon.com/exec/obidos/tg/detail/-/0321118898/ref=cm_rev_all_1/002-9449884-1448803?v=glance&s=books&vi=customer-reviews
 
Nicholas Cheung
Ranch Hand
Posts: 4982
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
I feel the style of the book is a bit classic, which focus on theory, and only use codes to illustrate some difficult concepts.
Thus, I would like to know how in depth the concepts being discussed.
Nick
 
Marco Pistoia
Author
Posts: 27
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
We cover the topics of cryptography in great depth. We dedicate a whole chapter to the theory of cryptography, even explaining the math behind the algorithms. JCA, JCE, JSSE, and JAAS are covered in great detail with tons of examples.
On amazon we got a partially negative review (3 stars) which basically said that we did not have enough source code and that the book seemed like a white paper. However, that review was based on a very early draft of the book (Addison-Wesley hired that reviewer about a year and a half ago). Since then the book changed, almost duplicated. We were still writing at the time the review was done. I was surprised to find on amazon the same words I read one and a half year ago. Looks like the reviewer has not read the final result, which contains 68 Java programs, some of which are 5 pages long.
Fortunately, another reviewer just gave us 5 stars and defined our book "The BEST book on Java/J2EE security," a sign that he was not influenced by an early reading.
 
Anushe Khan
Ranch Hand
Posts: 74
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Thanks Marco.
 
reply
    Bookmark Topic Watch Topic
  • New Topic