GeeCON Prague 2014*
The moose likes Security and the fly likes Core Security patterns book for J2EE Big Moose Saloon
  Search | Java FAQ | Recent Topics | Flagged Topics | Hot Topics | Zero Replies
Register / Login


JavaRanch » Java Forums » Engineering » Security
Bookmark "Core Security patterns book for J2EE " Watch "Core Security patterns book for J2EE " New topic
Author

Core Security patterns book for J2EE

Vijay Pratap Singh
Greenhorn

Joined: Nov 12, 2005
Posts: 12
We got this new book in my library, the patterns are similar to Core J2EE patterns with more emphasis on implementing security. The best practices and reality checks for designing security is very appealing. Free chapter and samples are available at coresecuritypatterns.com and securityfocus.com.


Vijay Singh<br />Systems Analyst<br />Infosys, Bangalore (India)
Jignesh Patel
Ranch Hand

Joined: Nov 03, 2001
Posts: 626

Vijay,
So if we have Core J2EE patterns book do we need to purchase core security patterns.
Jose Pereira
Greenhorn

Joined: Dec 10, 2002
Posts: 12
cant wait to read ... do this patterns substitute the container security and if so in what layers to apply ?
somkiat puisungnoen
Ranch Hand

Joined: Jul 04, 2003
Posts: 1312
great book


SCJA,SCJP,SCWCD,SCBCD,SCEA I
Java Developer, Thailand
Noel M OConnor
Greenhorn

Joined: Feb 14, 2005
Posts: 4
Does this book provide hints about what, when and how to secure different
aspects of a system. For example with JMS one approach might be to encrypt
data being sent via JMS or another alternative solution might be to run the
JMS over SSL.
Both approaches I feel are valid but the per message encryption approach
might be a bit of overkill.
Richard Hands
Greenhorn

Joined: Feb 25, 2004
Posts: 12
This looks like a very interesting book. I'd like to ask though, does it cover subjects such as an effective way to implement J2EE security alongside database row level security?
Ulf Dittmer
Marshal

Joined: Mar 22, 2005
Posts: 42055
    
  64
There is an excellent opportunity to ask the authors of the book anything you like: they're our guests in the Security forum this week, and are answering questions about the book and (Java) security in general.


Ping & DNS - my free Android networking tools app
Richard Hands
Greenhorn

Joined: Feb 25, 2004
Posts: 12
Yeah, it looks like the saloon email sent out earlier today advertising this weeks book contest was accidentally pointing people to the wrong forum. I've sent an email to the head honcho's here in the saloon, and hopefully they'll send out a correction email later, and maybe a kind moderator could move the incorrectly positioned posts to the security forum please?
Guillaume Compagnon
Ranch Hand

Joined: Aug 09, 2001
Posts: 106
Do you give some concrete example on the implementation of JAAS into the Servlet ? (for relying on a specific profiles repository)
is there something on the declarative security : put some meta data (JSR 175) into the code for tagging an intern (private) method of the servlet and delegate security control to the container


---------<BR>Guillaume
Jeeva Venkat
Greenhorn

Joined: Jan 11, 2006
Posts: 1
I think still this book would useful!
Ramesh Nagappan
Author
Ranch Hand

Joined: May 06, 2003
Posts: 159
Originally posted by Noel M OConnor:
Does this book provide hints about what, when and how to secure different
aspects of a system. For example with JMS one approach might be to encrypt
data being sent via JMS or another alternative solution might be to run the
JMS over SSL.
Both approaches I feel are valid but the per message encryption approach
might be a bit of overkill.


Noel,

Thanks for bringing this up.

The book discusses about all possible JMS Security options such as "Securing JMS Channel including message and transport", "JMS Provider Authentication", "Enabling JMS Destination Access Control". You need to be cautious about using these options...as all these options are not dictated by the JMS Specifications and it is more vendor specific.

/Ramesh


Ramesh Nagappan CISSP<br />Co-Author of "Core Security Patterns"<br />nramesh@post.harvard.edu<br /><a href="http://www.coresecuritypatterns.com" target="_blank" rel="nofollow">www.coresecuritypatterns.com</a>
 
GeeCON Prague 2014
 
subject: Core Security patterns book for J2EE