Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
SAML, profiles      2nd 3rd
SAML, request-reply model      
SAML, SAML 1.0      2nd
SAML, SAML 1.1      
SAML, SAML 2.0      2nd 3rd
SAML, SSO in      2nd
SAML, usage scenarios      
SAML, usage scenarios, DOS attacks      
SAML, usage scenarios, global logout      
SAML, usage scenarios, man-in-the-middle attacks      
SAML, usage scenarios, message replay and message modification      
SAML, usage scenarios, third-party authentication and authorization      
SAML, XML signatures in      
Sample code for security patterns      
Sample code for security patterns, Assertion Builder      
Sample code for security patterns, Audit Interceptor      
Sample code for security patterns, Authentication Enforcer      
Sample code for security patterns, Container Managed Security      
Sample code for security patterns, Credential Tokenizer pattern      
Sample code for security patterns, Dynamic Service Management      
Sample code for security patterns, Intercepting Web Agent      
Sample code for security patterns, Obfuscated Transfer Object      
Sample code for security patterns, Password Synchronizer      
Sample code for security patterns, Policy Delegate      
Sample code for security patterns, Secure Base Action      
Sample code for security patterns, Secure Logger      
Sample code for security patterns, Secure Pipe      
Sample code for security patterns, Secure Service Facade      
Sample code for security patterns, Secure Service Proxy      
Sample code for security patterns, Secure Session Object      
Sample code for security patterns, Single Sign-on Delegator      
SampleAuthorizationEnforcer.java file      
Sarbanes-Oxley Act (SOX)      
Sarbanes-Oxley Act (SOX), identity protection in      2nd
Sarbanes-Oxley Act (SOX), in security provisioning patterns      
SASL (Simple Authentication and Security Layer) API      
SASL (Simple Authentication and Security Layer) API, clients      2nd
SASL (Simple Authentication and Security Layer) API, installing      
SASL (Simple Authentication and Security Layer) API, servers      
SATAN (Security Administrator Tool for Analyzing Networks) tool      
SBU (Sensitive But Unclassified) information      
Scalability      
Scalability in security patterns      
Scalability in security patterns, Intercepting Web Agent      
Scalability in security patterns, Secure Message Router      
Scalability in security patterns, Secure Service Proxy      
Scalability in security patterns, security provisioning      
Scalability in security patterns, Single Sign-on Delegator      
Scalability, J2EE network topology      
Scalability, J2EE network topology, horizontal      
Scalability, J2EE network topology, vertical      
sCallerInRole method      
Scanners      
Scanners in biometrics      
Scanners, fingerprint      
Scanning data protection      [See Intercepting Validator pattern]
Scope      
Scope, Liberty Alliance      
Scope, service provisioning      
Screen display messages      
Scripting, cross-site      
seal method      
Sealed objects      
SealedObject class      
Search operations in SPML      
SearchRequest message      
Secret data      
Secret keys in assessment checklists      
SecretKeyFactory class      
Secure Association patterns      
Secure Base Action pattern      2nd
Secure Base Action pattern, and Policy Delegate pattern      
Secure Base Action pattern, consequences      
Secure Base Action pattern, forces      
Secure Base Action pattern, in case study      2nd 3rd 4th
Secure Base Action pattern, participants and responsibilities      2nd
Secure Base Action pattern, problem      
Secure Base Action pattern, reality checks      
Secure Base Action pattern, related patterns      
Secure Base Action pattern, sample code      
Secure Base Action pattern, security factors and risk      
Secure Base Action pattern, solution      
Secure Base Action pattern, strategies      
Secure Base Action pattern, structure      
Secure Communication patterns      
Secure data logger strategy      
Secure log store strategy      
Secure Logger pattern      2nd
Secure Logger pattern, consequences      2nd
Secure Logger pattern, forces      
Secure Logger pattern, in case study      2nd 3rd
Secure Logger pattern, participants and responsibilities      
Secure Logger pattern, problem      
Secure Logger pattern, reality check      
Secure Logger pattern, related patterns      
Secure Logger pattern, related patterns, Message Inspector      
Secure Logger pattern, related patterns, Secure Base Action      
Secure Logger pattern, sample code      
Secure Logger pattern, security factors and risks      
Secure Logger pattern, solution      
Secure Logger pattern, strategies      
Secure Logger pattern, structure      
Secure Message Interceptor pattern      
Secure Message Router pattern      
Secure Message Router pattern, consequences      
Secure Message Router pattern, forces      
Secure Message Router pattern, in case study      2nd 3rd 4th
Secure Message Router pattern, participants and responsibilities      
Secure Message Router pattern, problem      
Secure Message Router pattern, reality check      
Secure Message Router pattern, related patterns      
Secure Message Router pattern, related patterns, Message Interceptor Gateway      
Secure Message Router pattern, related patterns, Secure Service Proxy      
Secure Message Router pattern, security factors and risks      
Secure Message Router pattern, solution      
Secure Message Router pattern, strategies      
Secure Message Router pattern, structure      
Secure Pipe pattern      2nd 3rd
Secure Pipe pattern, consequences      
Secure Pipe pattern, forces      
Secure Pipe pattern, in case study      2nd 3rd 4th
Secure Pipe pattern, in secure log store strategy      2nd
Secure Pipe pattern, participants and responsibilities      
Secure Pipe pattern, problem      
Secure Pipe pattern, reality check      
Secure Pipe pattern, related patterns      
Secure Pipe pattern, related patterns, Authentication Enforcer      
Secure Pipe pattern, related patterns, Credential Tokenizer      
Secure Pipe pattern, related patterns, Dynamic Service Management      
Secure Pipe pattern, related patterns, Secure Logger      
Secure Pipe pattern, sample code      
Secure Pipe pattern, security factors and risks      
Secure Pipe pattern, solution      
Secure Pipe pattern, strategies      
Secure Pipe pattern, structure      
Secure Service Facade pattern      2nd 3rd
Secure Service Facade pattern, consequences      
Secure Service Facade pattern, forces      
Secure Service Facade pattern, in case study      
Secure Service Facade pattern, participants and responsibilities      2nd
Secure Service Facade pattern, problem      
Secure Service Facade pattern, reality check      
Secure Service Facade pattern, related patterns      
Secure Service Facade pattern, sample code      
Secure Service Facade pattern, security factors and risks      
Secure Service Facade pattern, solution      
Secure Service Facade pattern, strategies      
Secure Service Facade pattern, structure      
Secure Service Proxy pattern      
Secure Service Proxy pattern, consequences      
Secure Service Proxy pattern, forces      
Secure Service Proxy pattern, participants and responsibilities      
Secure Service Proxy pattern, problem      
Secure Service Proxy pattern, reality check      
Secure Service Proxy pattern, related patterns      
Secure Service Proxy pattern, related patterns, Container Managed Security      
Secure Service Proxy pattern, related patterns, Intercepting Web Agent      
Secure Service Proxy pattern, related patterns, Secure Service Facade      
Secure Service Proxy pattern, sample code      
Secure Service Proxy pattern, security factors and risks      
Secure Service Proxy pattern, solution      
Secure Service Proxy pattern, strategies      
Secure Service Proxy pattern, structure      
Secure service proxy single service strategy      
Secure Session Facade pattern      2nd
Secure Session Manager      2nd
Secure Session Object pattern      
Secure Session Object pattern, consequences      
Secure Session Object pattern, forces      
Secure Session Object pattern, participants and responsibilities      
Secure Session Object pattern, problem      
Secure Session Object pattern, reality check      
Secure Session Object pattern, related patterns      
Secure Session Object pattern, sample code      
Secure Session Object pattern, security factors and risks      
Secure Session Object pattern, solution      
Secure Session Object pattern, strategies      
Secure Session Object pattern, structure      
Secure Session pattern      
Secure Socket Layer      [See SSL (Secure Socket Layer)]
Secure UP      
Secure UP, artifacts in      
Secure UP, risk analysis      
Secure UP, trade-off analysis      
SecureBaseAction class      
SecureBaseAction class, Authentication Enforcer pattern      
SecureBaseAction class, Authorization Enforcer pattern      2nd
SecureBaseAction class, Intercepting Validator pattern      
SecureBaseAction class, JAAS Login Module strategy      
SecureBaseAction class, with Apache Struts      
SecureClassLoader class      
SecureID      
SecureRandom class      
SecureServiceFacade class      
SecureSessionFacadeSessionBean.java file      
Security Administrator Tool for Analyzing Networks (SATAN) tool      
Security Assertion Markup Language      [See SAML (Security Assertion Markup Language)]
Security by default      2nd
Security by default, application security      
Security by default, business challenges      
Security by default, compliance      [See Compliance]
Security by default, flaws and exploits      
Security by default, four W's      
Security by default, identity management      
Security by default, Java technology      
Security by default, justifications      
Security by default, personal identification      
Security by default, proactive and reactive      
Security by default, references      
Security by default, strategies      
Security by default, summary      
Security by default, weakest links      
Security class      
Security Context pattern      
Security Event Logging pattern      
Security factors in security patterns      
Security factors in security patterns, Assertion Builder      
Security factors in security patterns, Audit Interceptor      
Security factors in security patterns, Authentication Enforcer      
Security factors in security patterns, Authorization Enforcer      
Security factors in security patterns, Container Managed Security      
Security factors in security patterns, Credential Tokenizer      
Security factors in security patterns, Dynamic Service Management      
Security factors in security patterns, Intercepting Validator      
Security factors in security patterns, Intercepting Web Agent      
Security factors in security patterns, Message Inspector      
Security factors in security patterns, Message Interceptor Gateway      
Security factors in security patterns, Obfuscated Transfer Object      
Security factors in security patterns, Password Synchronizer      
Security factors in security patterns, Policy Delegate      
Security factors in security patterns, Secure Base Action      
Security factors in security patterns, Secure Logger      
Security factors in security patterns, Secure Message Router      
Security factors in security patterns, Secure Pipe      
Security factors in security patterns, Secure Service Facade      
Security factors in security patterns, Secure Service Proxy      
Security factors in security patterns, Secure Session Object      
Security factors in security patterns, Single Sign-on Delegator      
Security levels in J2EE network topology      
Security patterns      
Security patterns in patterns-driven security design      
Security patterns, application security assessment model      
Security patterns, applying      
Security patterns, Business tier      2nd
Security patterns, Business tier, Audit Interceptor      
Security patterns, Business tier, best practices      
Security patterns, Business tier, Container Managed Security      
Security patterns, Business tier, Dynamic Service Management      
Security patterns, Business tier, factor analysis      
Security patterns, Business tier, Obfuscated Transfer Object      
Security patterns, Business tier, overview      2nd
Security patterns, Business tier, pitfalls      
Security patterns, Business tier, Policy Delegate      
Security patterns, Business tier, references      
Security patterns, Business tier, Secure Service Facade      
Security patterns, Business tier, Secure Session Object      
Security patterns, classification      
Security patterns, existing      
Security patterns, factor analysis      
Security patterns, Identity management      2nd 3rd
Security patterns, Identity management, Assertion Builder      
Security patterns, Identity management, best practices      
Security patterns, Identity management, Credential Tokenizer pattern      
Security patterns, Identity management, pitfalls      
Security patterns, Identity management, references      
Security patterns, Identity management, Single Sign-on Delegator pattern      
Security patterns, in case study      2nd
Security patterns, infrastructure and quality of services      
Security patterns, Integration tier      
Security patterns, labeling in      
Security patterns, policy design in      
Security patterns, references      
Security patterns, relationships      
Security patterns, security provisioning      
Security patterns, security provisioning, best practices and pitfalls      
Security patterns, security provisioning, Password Synchronizer      
Security patterns, threat profiling      
Security patterns, tier analysis      
Security patterns, trust model      
Security patterns, Web services      2nd
Security patterns, Web services, best practices      
Security patterns, Web services, Message Inspector      
Security patterns, Web services, Message Interceptor Gateway      
Security patterns, Web services, pitfalls      
Security patterns, Web services, references      
Security patterns, Web services, Secure Message Router      
Security patterns, Web tier      2nd 3rd
Security patterns, Web tier, Authentication Enforcer      
Security patterns, Web tier, Authorization Enforcer      
Security patterns, Web tier, best practices      
Security patterns, Web tier, Intercepting Validator      
Security patterns, Web tier, Intercepting Web Agent      
Security patterns, Web tier, references      
Security patterns, Web tier, Secure Base Action      
Security patterns, Web tier, Secure Logger      
Security patterns, Web tier, Secure Pipe      
Security patterns, Web tier, Secure Service Proxy      
Security principles, references for      
Security Provider patterns      
Security provisioning      
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте