Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Secure Internet Programming: Security Issues for Mobile and Distributed Objects (Lecture Notes in Computer Science, 1603)

Secure Internet Programming: Security Issues for Mobile and Distributed Objects (Lecture Notes in Computer Science, 1603)

List Price: $77.95
Your Price: $77.95
Product Info Reviews

<< 1 >>

Rating: 5 stars
Summary: Advanced treatment of advanced topics
Review: This three section collection of papers is for advanced architects who are exploring contemporary security strategies. The collection is divided into foundation material, concepts and implementation. The book has a fourth section, but it's an appendix that lists the author bios.

The papers in this book are based on presentations given at two ECOOP'98 workshops: the Workshop on Distributed Object Security and the Workshop on Mobility: Secure Internet Mobile Computation. Unlike many books that are based on workshops and lecture notes, this one is more practical than academic. I like the fact that XML and Java are covered, and found the papers that deal with access controls filled with useful information. The paper by Blaze, Feigenbaum, Ioannidis, and Keromytis on the role of trust management in distributed systems, and Roth's paper on mutual protection of cooperating agents gave information that me and my team used to solve a design problem.

Like most collections of computer science lecture notes the writing is vastly different from more popular books, but the information is there if you're willing to dig through dry writing. Also, this book is not for programmers who either don't have a computer science degree or are not familiar with computer science and software engineering.

Rating: 5 stars
Summary: Advanced treatment of advanced topics
Review: This three section collection of papers is for advanced architects who are exploring contemporary security strategies. The collection is divided into foundation material, concepts and implementation. The book has a fourth section, but it's an appendix that lists the author bios.

The papers in this book are based on presentations given at two ECOOP'98 workshops: the Workshop on Distributed Object Security and the Workshop on Mobility: Secure Internet Mobile Computation. Unlike many books that are based on workshops and lecture notes, this one is more practical than academic. I like the fact that XML and Java are covered, and found the papers that deal with access controls filled with useful information. The paper by Blaze, Feigenbaum, Ioannidis, and Keromytis on the role of trust management in distributed systems, and Roth's paper on mutual protection of cooperating agents gave information that me and my team used to solve a design problem.

Like most collections of computer science lecture notes the writing is vastly different from more popular books, but the information is there if you're willing to dig through dry writing. Also, this book is not for programmers who either don't have a computer science degree or are not familiar with computer science and software engineering.


<< 1 >>

© 2004, ReviewFocus or its affiliates