Java Security Resources

From OWASP
Revision as of 05:13, 7 October 2006 by RogerNeville (Talk | contribs)

Jump to: navigation, search

Books

  • Core Security Patterns: Best practices and Strategies for J2EE, Web Services and Identity Management - So far the best book for Java Security - An indepth guide for implementing Java security in J2EE applications, Web Services, Identity & Access Management, Provisioning and Strong authentication. Introducing Java security mechanisms from ground up, this book presents 21 security patterns and 101 best practices associated with securing J2EE architecture, Web Services and Identity Management. This book goes deep into nitty-gritty details of implementing Java cryptography, J2EE Security, Web Services security (WS-Security, XML-DSIG, XML-ENC), Single sign-on using SAML and XACML, Identity federation using Liberty standards, multi-factor authentication (Smartcards and Biometrics) using Java technologies.
  • Enterprise Java Security: Building Secure J2EE Applications - A thorough look at the security features provided by Java and J2EE. Not much coverage specifically for web application security, no mention of Cross Site Scripting or Response Splitting attacks. No coverage of common frameworks such as Spring, Hibernate or EJB3. - Stephendv 03:42, 1 September 2006 (EDT)
  • J2EE Security - Covers the security features offered by Java and J2EE. Similar to other books on the subject, it makes the assumption that security=access control. Not a lot of coverage for preventing common web attacks such as XSS. - Stephendv 03:42, 1 September 2006 (EDT)
  • Java Security - "... covers Java's security mechanisms and teaches you how to work with them. It discusses class loaders, security managers, access lists, digital signatures, and authentication and shows how to use these to create and enforce your own security policy. "
  • Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering - "These techniques will show you how to better understand and work with third-party applications. Each chapter focuses on a technique to solve a specific problem, such as obfuscation in code or scalability vulnerabilities, outlining the issue and demonstrating possible solutions. "