Media praise for Java Security

Have a blog? Join our Reader Review Program

"Overall, the book is a valuable reference for the Java 2 application programmer."
--Edward A. Feustel, IEEE Distributed Systems Online, Volume 3, Number 3, 2002

"Anyone interested in taking an honest look at the risks of using Java to see whether it meets security needs should consider 'Java Security' required reading. Author Scott Oaks does an excellent job showing the deep security functionality afforded by Java, taking the often abstract Java security concepts and explaining them in a clear and understandable style...While directed at Java programmers, the book has significant value for any programmer or system administrator who needs to understand how Java security works."
--Ben Rothke, Security Management, June 2002

"Overall, the book is a valuable reference for the Java 2 application programmer."
--Edward Feustel, IEEE Distributed Systems Online, April 2002

"Anyone interested in taking an honest look at the risks of using Java to see whether it meets security needs should consider 'Java Security' required reading."
--Ben Rothke, Security Management, March 2002

"Scott Oaks' 'Java Security' is a detailed and well-organized reference. It is mainly geared for developers who need to implement security features into their Java applications. However, it is also useful for anyone who needs to understand the underlying basics of Java security...Scott Oaks' 'Java Security' is a thorough reference that Java developers will want to add to their library."
--Steven Leathem, pantug.org. March 2002

"Author Scott Oaks does an excellent job in showing the deep security functionality afforded by Java, taking the often abstract Java security concepts and explaining them in a clear and understandable style. As a senior software engineer with Sun Microsystems, Oaks has focused on Java for a number of years, and his expertise shows. While directed at Java programmers, the book has significant value for any programmer or system administrator who needs to understand how Java security works."
--Ben Rothke, Security Management, Jan 2002

"the 2nd edition of the best how to do Java Security book on the market...The book came in at a very good time. Just days after receiving it I had to unexpectedly implement some digital signature code. With the examples in the book, I had my program up and going in no time flat. It saved me hours that I would have otherwise spent with the less informative Sun API documentation...an excellent book for Java developers. I strongly recommend it to anyone doing Java security programming."
--Billy Barron, javamug.org. July 2001