Iron-Clad Java: Building Secure Web Applications
Manico, Jim; Detlefsen, August
Sold by ThriftBooks-Dallas, Dallas, TX, U.S.A.
AbeBooks Seller since July 2, 2009
Used - Soft cover
Condition: Used - Very good
Quantity: 1 available
Add to basketSold by ThriftBooks-Dallas, Dallas, TX, U.S.A.
AbeBooks Seller since July 2, 2009
Condition: Used - Very good
Quantity: 1 available
Add to basketFormer library book; May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.2.
Seller Inventory # G0071835881I4N10
Develop, deploy, and maintain secure Java applications using the expert techniques and open source libraries described in this Oracle Press guide. Iron-Clad Java presents the processes required to build robust and secure applications from the start and explains how to eliminate existing security bugs. Best practices for authentication, access control, data protection, attack prevention, error handling, and much more are included. Using the practical advice and real-world examples provided in this authoritative resource, you'll gain valuable secure software engineering skills.
"In this book, Jim Manico and August Detlefsen tackle security education from a technical perspective and bring their wealth of industry knowledge and experience to application designers. A significant amount of thought was given to include the most useful and relevant security content for designers to defend their applications. This is not a book about security theories, it’s the hard lessons learned from those who have been exploited, turned into actionable items for application designers, and condensed into print." ―From the Foreword by Milton Smith, Oracle Senior Principal Security Product Manager, Java
Jim Manico (Hawaii) is an independent software security educator. He has more than 18 years' experience with the Java programming language. Jim is also a global board member for the OWASP foundation.
August Detlefsen (San Francisco, CA) is a senior application security consultant with more than 18 years’ experience in software development, enterprise application architecture, and information security. He is an active member of OWASP.
"About this title" may belong to another edition of this title.
We guarantee each book that we send you. If you have any problems, please contact
our dedicated customer service department. They will do everything possible to
ensure you are happy with your order.
All domestic Standard shipments are distributed from our warehouses by OSM, then handed off to the USPS for final delivery.
2-Day Shipping is delivered by FedEx, which does not deliver to PO boxes.
International shipments are tendered to the local postal service in the destination country for final delivery – We do not use courier services for international deliveries.
Order quantity | 4 to 8 business days | 4 to 8 business days |
---|---|---|
First item | US$ 0.00 | US$ 0.00 |
Delivery times are set by sellers and vary by carrier and location. Orders passing through Customs may face delays and buyers are responsible for any associated duties or fees. Sellers may contact you regarding additional charges to cover any increased costs to ship your items.