This week's book giveaway is in the General Computing forum. We're giving away four copies of Arduino in Action and have Martin Evans, Joshua Noble, and Jordan Hochenbaum on-line! See this thread for details.
1.How would you compare your book with other books like Pankaj Kumar�s book J2ee Security for Servlets,Ejb�s? 2. Can it be used as a good reference book on J2SE security topics and security aspects of Enterprise Applications Technologies. or The main focus is only on security aspects of Enterprise applications technologies (Servlets, EJBs and Web Services)? Thanks.
Hi Anushe, Here are my answers. 1.How would you compare your book with other books like Pankaj Kumar�s book J2ee Security for Servlets,Ejb�s? ANSWER: Well, I don't want to be that one who says that his own book is better than others. The truth is that we made a choice when we started to write this book. We really wanted to write a definitive guide to Java security and cover all the hot topics. So we go over Servlets and EJBs, but we do much more than that: we have lots of crypto, Web services, J2EE and J2SE stuff. 2. Can it be used as a good reference book on J2SE security topics and security aspects of Enterprise Applications Technologies. or The main focus is only on security aspects of Enterprise applications technologies (Servlets, EJBs and Web Services)? ANSWER: We covered J2EE and J2SE security in detail. But we covered lots of related topics as well: cryptography, architectures, scenarios, firewalls, etc. So hopefully our book will be a good reference for anybody who needs to work on an enterprise system securely. Thanks, Marco Pistoia
Marco Pistoia, Ph.D.<br /><a href="http://www.research.ibm.com/people/p/pistoia/" target="_blank" rel="nofollow">http://www.research.ibm.com/people/p/pistoia/</a>
I feel the style of the book is a bit classic, which focus on theory, and only use codes to illustrate some difficult concepts. Thus, I would like to know how in depth the concepts being discussed. Nick
Joined: Apr 19, 2004
We cover the topics of cryptography in great depth. We dedicate a whole chapter to the theory of cryptography, even explaining the math behind the algorithms. JCA, JCE, JSSE, and JAAS are covered in great detail with tons of examples. On amazon we got a partially negative review (3 stars) which basically said that we did not have enough source code and that the book seemed like a white paper. However, that review was based on a very early draft of the book (Addison-Wesley hired that reviewer about a year and a half ago). Since then the book changed, almost duplicated. We were still writing at the time the review was done. I was surprised to find on amazon the same words I read one and a half year ago. Looks like the reviewer has not read the final result, which contains 68 Java programs, some of which are 5 pages long. Fortunately, another reviewer just gave us 5 stars and defined our book "The BEST book on Java/J2EE security," a sign that he was not influenced by an early reading.