Help coderanch get a
new server
by contributing to the fundraiser
  • Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Jeanne Boyarsky
  • Ron McLeod
  • Paul Clapham
  • Liutauras Vilda
Sheriffs:
  • paul wheaton
  • Rob Spoor
  • Devaka Cooray
Saloon Keepers:
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Frits Walraven
  • Tim Moores
Bartenders:
  • Mikalai Zaikin

Questions to Chris and Ramesh

 
Ranch Hand
Posts: 44
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi Chris and Ramesh,

First of all, Thanks a lot for your great work. Through I haven�t got chance to read the book, I checked the book information in Amazon.com, and Free Sample in http://www.coresecuritypatterns.com. It really inspired me.

My question is the following:

Almost all books in Java/J2EE/J2ME/WS has its own chapters on Security, some also give their design concerns. How does your book differ from a gallery of those chapters?

And also a tricky question :

Why do you choose the China Great Wall as the book image? any special reason? The only guess I can give is about the Chinese Wall.
 
Wanderer
Posts: 18671
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
This thread should really be in the Security forum, which is where this week's book promo is taking place. There was a an error in the e-mail announcing this promotion, incorrectly giving the URL of the OO/Patterns forum instead of the Security forum. I'm moving this thread to Security; please continue the conversation there.
 
Author
Posts: 159
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator

Originally posted by Hank GU:
Hi Chris and Ramesh,

First of all, Thanks a lot for your great work. Through I haven�t got chance to read the book, I checked the book information in Amazon.com, and Free Sample in http://www.coresecuritypatterns.com. It really inspired me.

My question is the following:

Almost all books in Java/J2EE/J2ME/WS has its own chapters on Security, some also give their design concerns. How does your book differ from a gallery of those chapters?

And also a tricky question :

Why do you choose the China Great Wall as the book image? any special reason? The only guess I can give is about the Chinese Wall.




Hank,

Thanks for your comments about the book.

To give a quick one line explanantion... "Our book is not just about explaining Java Security Mechanisms" more than that...the core objective of the book is to promote "Patterns-driven Security Design and Best practices" for Java architects and developers."

We introduced 23 Security Patterns and 101 best practices to help implementing security...explaining how to proactively identify risks and vulnerabilities in J2EE applications and Web services.

At the outset, this book will serve as your "one-stop" guide to learning and implementing security using Java.

The reason for using "The Great Wall" in the cover, it is a pictorial representation of an Ancient Security Pattern.

/Ramesh
 
Hank GU
Ranch Hand
Posts: 44
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator

Originally posted by Ramesh Nagappan:



Hank,

Thanks for your comments about the book.

To give a quick one line explanantion... "Our book is not just about explaining Java Security Mechanisms" more than that...the core objective of the book is to promote "Patterns-driven Security Design and Best practices" for Java architects and developers."

We introduced 23 Security Patterns and 101 best practices to help implementing security...explaining how to proactively identify risks and vulnerabilities in J2EE applications and Web services.

At the outset, this book will serve as your "one-stop" guide to learning and implementing security using Java.

The reason for using "The Great Wall" in the cover, it is a pictorial representation of an Ancient Security Pattern.

/Ramesh



Thanks a lot for your nice explaination, Ramesh.
 
We don't have time for this. We've gotta save the moon! Or check this out:
We need your help - Coderanch server fundraiser
https://coderanch.com/t/782867/Coderanch-server-fundraiser
reply
    Bookmark Topic Watch Topic
  • New Topic