Secure Java PDF ePub eBook

Books Info:

Secure Java free pdf As the Internet has evolved, so have the various vulnerabilities, which largely stem from the fact that developers are unaware of the importance of a robust application security program. This book aims to educate readers on application security and building secure web applications using the new Java Platform. The text details a secure web application development process from the risk assessment phase to the proof of concept phase. The authors detail such concepts as application risk assessment, secure SDLC, security compliance requirements, web application vulnerabilities and threats, security implementation techniques using Java technologies, and Web application security testing.

About Abhay Bhargav

Abhay Bhargav is the founder and CTO of we45 Solutions India Pvt. Ltd., an information security solutions company. As the CTO of we45, his primary role is to deliver information security consulting solutions for diverse clientele. He also oversees the information security research and application development activities of we45. He has performed security assessments for enterprises in various industires including banking, software development, retail, telecom, and legal. Previously, he was a security assessor for the payment card industry and has led several security assessments for payment card industry compliance. He specializes in Web application security and has performed security testing and consulting engagements for a wide array of enterprises and governmental/quasi-governmental entities. He also possesses security code review, vulnerability assessment, and penetration testing experience. He has been involved in several such assessments for small and large clients from various industries. Abhay is a regular speaker at industry events. He has spoken at the OWASP (Open Web Application Security Project) AppSec Conference in New York. He is a regular speaker at prestigious industry events such as the PCI Summit in Mumbai, December 2008, Business Technology Summit and events organized by the Confederation of Indian Industry (CII). He is also a trainer and has led several public workshops on information security subjects including PCI, PA-DSS, Web application security, and risk assessment. Apart from his professional interests, Abhay is also a trained Carnatic classical flutist and vocalist. He is also a playwright who has an English comedy play to his writing credits. He blogs actively and maintains an information security blog. He writes articles on computer education for the rural youth on a weekly basis for a leading daily. Dr. B. V. Kumar, currently the director at SESCon Technology Solutions, has a Masters in Technology from IIT Kanpur and a Ph.D. from IIT Kharagpur. He has more than 20 years of experience in the field of information technology at various levels and in organizations such as ComputerVision Corporation (Singapore), Parametric Technologies (Seoul, S. Korea), Sun Microsystems (India), and Infosys. Prior to SESCon, Dr. Kumar was director and chief architect at Cognizant Technology Solutions and was responsible for the research and development activities such as IP creation, technology evangelization, and branding and project support as well as new initiatives at Cognizant. Dr. Kumar has been working on the enterprise technologies for more than 8 years, focusing on the new enterprise Java and Web services technologies. As a chief architect and director at SESCon Technology Solutions, Dr. Kumar is managing IP and asset creation, technology branding and evangelization, community development, project support, and educational services. Dr. Kumar has filed for two patents in the IT space and published many technological papers in international journals and conferences. He has coauthored Web Services: An Introduction (ISBN 0070593787), J2EE Architecture (ISBN 007059936X), and, more recently, Implementing SOA Using Java EE (ISBN 0321492153).

Details Book

Author : Abhay Bhargav
Publisher : CRC Press Inc
Data Published : 15 June 2010
ISBN : 1439823510
EAN : 9781439823514
Format Book : PDF, Epub, DOCx, TXT
Number of Pages : 350 pages
Age + : 15 years
Language : English
Rating :

Reviews Secure Java

17 Comments Add a comment

Related eBooks Download

  • Java Coding Guidelines free pdfJava Coding Guidelines

    "A must-read for all Java developers...Every developer has a responsibility to author code that is free of significant security vulnerabilities. This book provides realistic guidance to help Java developers implement desired functionality with security..

  • Java EE 7 Recipes free pdfJava EE 7 Recipes

    Java EE 7 Recipes takes an example-based approach in showing how to program Enterprise Java applications in many different scenarios. Be it a small-business web application. or an enterprise database application..

  • Java EE and HTML5 Enterprise Application Development free pdfJava EE and HTML5 Enterprise Application Development

    Create and deploy modern enterprise applications that leverage HTML5 and Java EE 7 on the NetBeans IDE using this definitive Oracle Press guide. Java EE and HTML5 Enterprise Application Development is the leading single source of information on the junction of Java EE and HTML5..

  • JRuby Rails Web Application Development free pdfJRuby Rails Web Application Development

    This SpringerBrief explains how to create a Rails web application with JRuby. a 100% Java implementation for Ruby. This brief demonstrates how Oracle(R) WebLogic servers and JBoss(R) application servers deploy the JRuby application..

  • Embedded Systems Security free pdfEmbedded Systems Security

    The ultimate resource for making embedded systems reliable. safe. and secure "Embedded Systems Security" provides a broad understanding of security principles. concerns. and technologies. It provides proven techniques for the efficient development of safe and secure embedded software..

  • Secure Java free pdfSecure Java

    . As the Internet has evolved, so have the various vulnerabilities, which largely stem from the fact that developers are unaware of the importance of a robust application security program. This book a