Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
-addcert option      
-addjarsig option      
-certreq option      
-export option      
-genkey option      
-import option      
-keyalg option      
-keypass option      
-keystore option      
-list option      
-printcert option      
-showcert option      
-storepass option      
-storepasswd option      
<<IssuesInstant> element
<application-desc> element
<AttributeValue> element
<AuthenticationContextStatement> message
<AuthnRequest> message      2nd
<AuthnResponse> message      2nd
<AuthorizationDecisionStatement> feature      2nd
<CanonicalizationMethod> element
<CipherData> element
<CombinerParameters> element
<condition> element      
<condition> element, EPAL
<condition> element, XACML
<Decision> element
<DigestMethod> element
<DigestValue> element
<ds:KeyInfo> element
<ds:Signature> element
<EncryptedData> element
<EncryptedKey> element
<EncryptionMethod> element
<EncryptionProperties> element
<Environment> element      
<EnvironmentMatch> element
<ExactlyOne> element
<FederationTerminationNotification> message
<information> element      
<KeyInfo> element
<Manifest> element
<NameIdentifierMappingRequest> message
<Object> element      
<PolicySetIdReference> element
<r:license> element
<Reference> element      
<Request> element
<resources> element      
<Result> element      
<rule> element      
<RuleCombinerparameters> element
<saml:Assertion> element
<security> element      
<Signature> element
<SignatureMethod> element
<SignatureProperties> element
<Signaturevalue> element
<SignedInfo> element
<Status> element
<Target> element      
<Transforms> element      
<VariableDefinition> element
<VariableReference> element
<Version> element      
<wsse:BinarySecurityToken> element
<wsse:Security> element
<wsse:SecurityTokenReference> element
<wsse:UsernameToken> element
<wsu:TimeStamp> element
<xenc:EncryptedData> element
<xenc:EncryptedKey> element
Ability to verify (ATV) probability      
Abort method      
Abstract Factory pattern      
Abstract objects      
abstraction layers      
Access control      2nd
Access control lists (ACLs)      
Access control lists (ACLs), J2EE      
Access control lists (ACLs), JMS      
Access control, Assertion Builder pattern      
Access control, broken      
Access control, Business tier patterns      2nd
Access control, DMTF      
Access control, EPAL      
Access control, for smart cards      
Access control, IETF Policy Management Working Group      
Access control, J2EE      
Access control, management services      2nd
Access control, Parlay Group      
Access control, physical and logical      
Access control, Web services      2nd
Access points in case study      
AccessController class      
Accountability, checklist for      
accounts      [See User account provisioning]
Accuracy of biometric verification      
ACLs (access control lists)      
ACLs (access control lists), J2EE      
ACLs (access control lists), JMS      
Actions in Parlay      
Active RFID tags      
Activities in Secure UP      
Actors in use cases      
Add operation in SPML      
Add-on, security as      
addListener method      
AddResponse message      
Administration      
Administration in biometric systems      
Administration in Web tier patterns      
Administration, reality checks for      
Administrator privileges      
Advanced Encryption Standard (AES)      2nd 3rd
Advice in SAML assertions      
Advisory policies      
Agent-based and agentless architecture for user account provisioning      
Agent-based authentication      2nd
Agent-based policy enforcement      
Aggregation, service      
Alchemy of security design      
Alchemy of security design, conclusion      
Alchemy of security design, framework adoption      
Alchemy of security design, rationale      
Alchemy of security design, reality checks      [See Reality checks]
Alchemy of security design, refactoring      
Alchemy of security design, references      
Alchemy of security design, Secure UP      
Alchemy of security design, Secure UP, artifacts in      
Alchemy of security design, Secure UP, risk analysis      
Alchemy of security design, Secure UP, trade-off analysis      
Alchemy of security design, security patterns      [See Security patterns]
Alchemy of security design, service continuity and recovery      
Alchemy of security design, testing      
ALE (Annual Loss Expectancy)      2nd
alerts      
Alerts, SSL      
Alerts, Web services patterns      
AlgorithmParameter class      
AlgorithmParameterGenerator class      
Alteration attacks      
Alteration attacks, SAML      
Alteration attacks, Secure Logger pattern      2nd
Annual Loss Expectancy (ALE)      2nd
Anonymous EJB resources      
AOP (Aspect Oriented Programming) techniques      
Apache Struts      
Apache Struts, in form validation XML      
Apache Struts, in Web data validation      
Apache Struts, with SecureBaseAction      
Apache Struts, with SimpleFormAction      
APDUs (Application Protocol Data Units)      
Apis      
APIs, BioAPI      
APIs, CertPath      
APIs, JAAS      
APIs, Java      
APIs, Java Card      
APIs, JCA      
APIs, JCE      
APIs, JSSE      
APIs, SAAJ      2nd 3rd
APIs, SASL      
APIs, Vendor-specific      
Applets      
Applets for smart cards      
Applets, Java Card      
Applets, signed      
Appletviewers      
Appliances      
Appliances, firewall      
Appliances, strategies for      
Appliances, XML-aware      
Application Controller      
Application data messages in SSL      
Application Protocol Data Units (APDUs)      
Application Requests      
Application security assessment model      
Application Security Providers      
Application-based authentication      
Applications and application security      
Applications and application security, access control      
Applications and application security, as weakest links      
Applications and application security, audit and logging      
Applications and application security, authentication      
Applications and application security, buffer overflow      
Applications and application security, CLDC      
Applications and application security, coding problems      
Applications and application security, configuration data      
Applications and application security, cross-site scripting      
Applications and application security, data injection flaws      
Applications and application security, data transit and storage      
Applications and application security, deployment problems      
Applications and application security, DOS and DDOS attacks      
Applications and application security, encryption      
Applications and application security, error handling      
Applications and application security, in case study      
Applications and application security, input validation failures      
Applications and application security, Intercepting Web Agent pattern      
Applications and application security, J2EE      
Applications and application security, JSSE      
Applications and application security, man-in-the-middle attacks      
Applications and application security, multiple sign-ons      
Applications and application security, output sanitation      
Applications and application security, password exploits      
Applications and application security, policies      
Applications and application security, Secure Pipe pattern      
Applications and application security, security provisioning patterns      
Applications and application security, security tokens      
Applications and application security, servers      
Applications and application security, servers for biometrics      
Applications and application security, servers for smart cards      
Applications and application security, servers in use cases      
Applications and application security, session identifiers      
Applications and application security, session theft      
Applications and application security, Web tier patterns      
Applying security patterns      
Architecture      
Architecture in case study      2nd
Architecture in security patterns      
Architecture in security patterns, Authentication Enforcer      
Architecture in security patterns, Business tier      
Architecture in security patterns, Intercepting Validator      
Architecture in security patterns, Intercepting Web Agent      
Architecture in security patterns, Secure Base Action      
Architecture in security patterns, Secure Service Proxy      
Architecture, inefficiencies      
architecture, J2EE      
Architecture, J2ME      
Architecture, Java      
Architecture, Liberty Alliance      
Architecture, patterns-driven security design      
Architecture, personal identification systems      
Architecture, personal identification systems, biometrics      
Architecture, personal identification systems, smart cards      
Architecture, risk analysis      
architecture, SAML      2nd
Architecture, Secure UP      2nd
Architecture, user account provisioning      
Architecture, user account provisioning, centralized model vs. decentralized      
Architecture, user account provisioning, components of      
Architecture, user account provisioning, logical      
Architecture, Web services      
Architecture, XACML      
Artifact Resolution Profile      
Artifacts in Secure UP      
Aspect Oriented Programming (AOP) techniques      
Assemblers, J2EE      
Assertion Builder pattern      2nd
Assertion Builder pattern in service provisioning      
Assertion Builder pattern in single sign-on      
Assertion Builder pattern, and Single Sign-on Delegator pattern      2nd
Assertion Builder pattern, consequences      
Assertion Builder pattern, forces      
Assertion Builder pattern, participants and responsibilities      
Assertion Builder pattern, problem      
Assertion Builder pattern, reality check      
Assertion Builder pattern, related patterns      
Assertion Builder pattern, sample code      
Assertion Builder pattern, security factors and risks      
Assertion Builder pattern, solution      
Assertion Builder pattern, strategies      
Assertion Builder pattern, structure      
Assertion class      
Assertion Query/Request profile      
AssertionContext class      
AssertionContextImpl class      2nd
assertions      
Assertions, Java System Access Manager      
assertions, SAML      
Assertions, SAML, attribute      
Assertions, SAML, authentication      2nd
Assertions, SAML, authorization      
Assertions, WS-Policy      
Assertions, WS-Security      
assertRequest method      
Assessment checklists      
Asset valuation      
Asymmetric ciphers      
Attachments in SOAP messages      
Attack trees      
AttributeQuery class      
Attributes      
Attributes, J2EE      
Attributes, SAML      
Attributes, SAML, assertion      2nd
Attributes, SAML, authority      2nd
Attributes, SAML, mapping      
Attributes, SAML, profile      
Attributes, SAML, repository      
Attributes, Secure Service Facade pattern      
Attributes, XACML      2nd
AttributeStatement class      2nd
ATV (ability to verify) probability      
Audit Interceptor pattern      2nd 3rd
Audit Interceptor pattern, and Message Inspector pattern      
Audit Interceptor pattern, consequences      
Audit Interceptor pattern, forces      
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2020
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте