search for books and compare prices
Search >
cover image
Java Security: Hostile Applets, Holes & Antidotes
Click any price to visit the store and find more details or purchase the item. Pricing is shown for items sent to or within the United States via the least expensive method. Results are sorted by price, and shipping costs are not included. Permanent link:
3–11 days
1–2 days
2–9 days

Notes on prices

The price is the lowest for any condition, which may be new or used; other conditions may also be available.
Includes prices for new and used copies from resellers listed at Amazon (for that country).
Rental copies must be returned at the end of the designated period, and may involve a deposit.
Click to show details on same page as prices
Publisher John Wiley & Sons Inc
Publication date December 1, 1996
Pages 192
Binding Paperback
Book category Adult Non-Fiction
ISBN-13 9780471178422
ISBN-10 047117842X
Dimensions 0.50 by 7.75 by 9.25 in.
Weight 1.05 lbs.
Availability§ Out of Print
Original list price $19.95
As reported by publisher description: Product Description: "This book is mandatory reading for every user and developer of webware." —Peter G. Neumann Moderator of the Risks Forum

Do you know how to sort out fact from fiction when it comes to Java security? Did you know that whenever you surf the Web with Netscape or Internet Explorer you are using Java? That means that someone else's code is running untested on your computer. Don't wait for a hostile applet to show you how vulnerable your site is. International security experts Gary McGraw and Edward Felten —leader of the famed Princeton team —tell you how Java security works, and how it doesn't.

McGraw and Felten give you all the information you need to create a reasonable Java use strategy. Java Security gives you:

  • Guidelines for using Java more safely today
  • What to expect in the Java security future
  • A clear treatment of the risks of using Java
  • Vital information explaining the three prongs of the Java security model: the Byte Code Verifier, the Applet Class Loader, and the Security Manager
  • Clear explanations of holes in the Java security model

Whether you're a webmaster, an information technology manager charged with creating an intelligent security policy for your organization, or a concerned Web user, this book is must reading.

visit this book's companion web site at:

visit our web site at: I

Recency: These prices were retrieved a few seconds ago. The price comparison took about 5 seconds.

Shipping costs: The shipping cost shown by default, if you choose to display it, is the cheapest available for your destination.

Sales tax inclusion: If you set up an account with, live in the United States, and specify your state, you can choose to show shipping fees in price results. In this case, we include the sales tax whenever we can determine that such tax is charged by a store for delivery to your state.

Orders shipped across national borders or for countries other than the U.S.: Neither the sales price nor the shipping includes VAT, GST, customs, or other applicable taxes. Please consult the store to determine exact fees.

No warranties are made express or implied about the accuracy, timeliness, merit, or value of the information provided. Information subject to change without notice. is not a bookseller, just an information source.

Is information about the book missing or in error? Want to know more about where our bibliographic and pricing details come from? Report corrections and find out about's information sources here.