| |
Downloads - Download the complete source code and classes used in this tutorial, JavaSecurity1-source.jar.
- See BouncyCastle (http://www.bouncycastle.org) for the third-party provider library used in this tutorial.
Articles, tutorials, and other online resources - Sun's Java Security Web site (http://java.sun.com/security) is the definitive source for Java security.
- Read Brad Rubin's second tutorial in this series, "Java security, Part 2: Authentication and authorization" (developerWorks, July 2002, http://www-106.ibm.com/developerworks/education/r-jsec2.html).
- Michael Yuan demonstrates how to digitally sign and verify XML documents on wireless devices using the Bouncy Castle Crypto APIs in his article "Securing your J2ME/MIDP apps" (developerWorks, June 2002, http://www-106.ibm.com/developerworks/library/j-midpds.html).
- Greg Travis offers a practical look at JSSE in his tutorial "Using JSSE for secure socket communication" (developerWorks, April 2002, http://www-106.ibm.com/developerworks/education/r-jsse.html).
Books - For an overall discussion of Web security and Java technology, see Web Security, Privacy, and Commerce, 2nd Edition (http://www.oreilly.com/catalog/websec2/), by Simson Garfinkel and Gene Spafford, O'Reilly, 2002.
- If you want to focus more on Java security, see Professional Java Security (http://www.amazon.com/exec/obidos/ASIN/1861004257/104-8739833-1347930), by Jess Garms and Daniel Somerfield, Wrox Press, 2001.
- Another great resource for learning about Java security is Java Security (http://www.amazon.com/exec/obidos/ASIN/0596001576), by Scott Oaks, O'Reilly & Associates, 2001.
- Find out what everyone needs to know about security in order to survive and be competitive in Secrets and Lies: Digital Security in a Networked World (http://www.counterpane.com/sandl.html), by Bruce Schneier, 2000.
- Boasting new algorithms, more information on the Clipper Chip and key escrow, dozens of new protocols, more information on PGP, detailed information on key management and modes of operation, and new source code, this book should be a security winner: Applied Cryptography, Second Edition (http://www.counterpane.com/applied.html), by Bruce Schneier, 1995.
Additional resources - The IBM Java Security Research page (http://www.research.ibm.com/javasec/) details various security projects in the works.
- Visit the Tivoli Developer domain (http://www-106.ibm.com/developerworks/tivoli/) for help in building and maintaining the security of your e-business.
- The developerWorks Security special topic (http://www-106.ibm.com/developerworks/security/) offers developers hands-on technical information covering the general topic of security.
- Participate in the developerWorks Java security forum hosted by Paul Abbott.
- You'll find hundreds of articles about every aspect of Java programming in the developerWorks Java technology zone (http://www-106.ibm.com/developerworks/java/).
- See the developerWorks tutorials page (http://www-105.ibm.com/developerworks/education.nsf/dw/java-onlinecourse-bytitle) for a complete listing of free Java technology-related tutorials from developerWorks.
|