Авторизация
Поиск по указателям
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Авторы: Steel Ch., Nagappan R., Lai R.
Аннотация: For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.
Язык:
Рубрика: Технология /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 2005
Количество страниц: 1088
Добавлена в каталог: 19.08.2007
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
SAML, profiles 2nd 3rd
SAML, request-reply model
SAML, SAML 1.0 2nd
SAML, SAML 1.1
SAML, SAML 2.0 2nd 3rd
SAML, SSO in 2nd
SAML, usage scenarios
SAML, usage scenarios, DOS attacks
SAML, usage scenarios, global logout
SAML, usage scenarios, man-in-the-middle attacks
SAML, usage scenarios, message replay and message modification
SAML, usage scenarios, third-party authentication and authorization
SAML, XML signatures in
Sample code for security patterns
Sample code for security patterns, Assertion Builder
Sample code for security patterns, Audit Interceptor
Sample code for security patterns, Authentication Enforcer
Sample code for security patterns, Container Managed Security
Sample code for security patterns, Credential Tokenizer pattern
Sample code for security patterns, Dynamic Service Management
Sample code for security patterns, Intercepting Web Agent
Sample code for security patterns, Obfuscated Transfer Object
Sample code for security patterns, Password Synchronizer
Sample code for security patterns, Policy Delegate
Sample code for security patterns, Secure Base Action
Sample code for security patterns, Secure Logger
Sample code for security patterns, Secure Pipe
Sample code for security patterns, Secure Service Facade
Sample code for security patterns, Secure Service Proxy
Sample code for security patterns, Secure Session Object
Sample code for security patterns, Single Sign-on Delegator
SampleAuthorizationEnforcer.java file
Sarbanes-Oxley Act (SOX)
Sarbanes-Oxley Act (SOX), identity protection in 2nd
Sarbanes-Oxley Act (SOX), in security provisioning patterns
SASL (Simple Authentication and Security Layer) API
SASL (Simple Authentication and Security Layer) API, clients 2nd
SASL (Simple Authentication and Security Layer) API, installing
SASL (Simple Authentication and Security Layer) API, servers
SATAN (Security Administrator Tool for Analyzing Networks) tool
SBU (Sensitive But Unclassified) information
Scalability
Scalability in security patterns
Scalability in security patterns, Intercepting Web Agent
Scalability in security patterns, Secure Message Router
Scalability in security patterns, Secure Service Proxy
Scalability in security patterns, security provisioning
Scalability in security patterns, Single Sign-on Delegator
Scalability, J2EE network topology
Scalability, J2EE network topology, horizontal
Scalability, J2EE network topology, vertical
sCallerInRole method
Scanners
Scanners in biometrics
Scanners, fingerprint
Scanning data protection [See Intercepting Validator pattern]
Scope
Scope, Liberty Alliance
Scope, service provisioning
Screen display messages
Scripting, cross-site
seal method
Sealed objects
SealedObject class
Search operations in SPML
SearchRequest message
Secret data
Secret keys in assessment checklists
SecretKeyFactory class
Secure Association patterns
Secure Base Action pattern 2nd
Secure Base Action pattern, and Policy Delegate pattern
Secure Base Action pattern, consequences
Secure Base Action pattern, forces
Secure Base Action pattern, in case study 2nd 3rd 4th
Secure Base Action pattern, participants and responsibilities 2nd
Secure Base Action pattern, problem
Secure Base Action pattern, reality checks
Secure Base Action pattern, related patterns
Secure Base Action pattern, sample code
Secure Base Action pattern, security factors and risk
Secure Base Action pattern, solution
Secure Base Action pattern, strategies
Secure Base Action pattern, structure
Secure Communication patterns
Secure data logger strategy
Secure log store strategy
Secure Logger pattern 2nd
Secure Logger pattern, consequences 2nd
Secure Logger pattern, forces
Secure Logger pattern, in case study 2nd 3rd
Secure Logger pattern, participants and responsibilities
Secure Logger pattern, problem
Secure Logger pattern, reality check
Secure Logger pattern, related patterns
Secure Logger pattern, related patterns, Message Inspector
Secure Logger pattern, related patterns, Secure Base Action
Secure Logger pattern, sample code
Secure Logger pattern, security factors and risks
Secure Logger pattern, solution
Secure Logger pattern, strategies
Secure Logger pattern, structure
Secure Message Interceptor pattern
Secure Message Router pattern
Secure Message Router pattern, consequences
Secure Message Router pattern, forces
Secure Message Router pattern, in case study 2nd 3rd 4th
Secure Message Router pattern, participants and responsibilities
Secure Message Router pattern, problem
Secure Message Router pattern, reality check
Secure Message Router pattern, related patterns
Secure Message Router pattern, related patterns, Message Interceptor Gateway
Secure Message Router pattern, related patterns, Secure Service Proxy
Secure Message Router pattern, security factors and risks
Secure Message Router pattern, solution
Secure Message Router pattern, strategies
Secure Message Router pattern, structure
Secure Pipe pattern 2nd 3rd
Secure Pipe pattern, consequences
Secure Pipe pattern, forces
Secure Pipe pattern, in case study 2nd 3rd 4th
Secure Pipe pattern, in secure log store strategy 2nd
Secure Pipe pattern, participants and responsibilities
Secure Pipe pattern, problem
Secure Pipe pattern, reality check
Secure Pipe pattern, related patterns
Secure Pipe pattern, related patterns, Authentication Enforcer
Secure Pipe pattern, related patterns, Credential Tokenizer
Secure Pipe pattern, related patterns, Dynamic Service Management
Secure Pipe pattern, related patterns, Secure Logger
Secure Pipe pattern, sample code
Secure Pipe pattern, security factors and risks
Secure Pipe pattern, solution
Secure Pipe pattern, strategies
Secure Pipe pattern, structure
Secure Service Facade pattern 2nd 3rd
Secure Service Facade pattern, consequences
Secure Service Facade pattern, forces
Secure Service Facade pattern, in case study
Secure Service Facade pattern, participants and responsibilities 2nd
Secure Service Facade pattern, problem
Secure Service Facade pattern, reality check
Secure Service Facade pattern, related patterns
Secure Service Facade pattern, sample code
Secure Service Facade pattern, security factors and risks
Secure Service Facade pattern, solution
Secure Service Facade pattern, strategies
Secure Service Facade pattern, structure
Secure Service Proxy pattern
Secure Service Proxy pattern, consequences
Secure Service Proxy pattern, forces
Secure Service Proxy pattern, participants and responsibilities
Secure Service Proxy pattern, problem
Secure Service Proxy pattern, reality check
Secure Service Proxy pattern, related patterns
Secure Service Proxy pattern, related patterns, Container Managed Security
Secure Service Proxy pattern, related patterns, Intercepting Web Agent
Secure Service Proxy pattern, related patterns, Secure Service Facade
Secure Service Proxy pattern, sample code
Secure Service Proxy pattern, security factors and risks
Secure Service Proxy pattern, solution
Secure Service Proxy pattern, strategies
Secure Service Proxy pattern, structure
Secure service proxy single service strategy
Secure Session Facade pattern 2nd
Secure Session Manager 2nd
Secure Session Object pattern
Secure Session Object pattern, consequences
Secure Session Object pattern, forces
Secure Session Object pattern, participants and responsibilities
Secure Session Object pattern, problem
Secure Session Object pattern, reality check
Secure Session Object pattern, related patterns
Secure Session Object pattern, sample code
Secure Session Object pattern, security factors and risks
Secure Session Object pattern, solution
Secure Session Object pattern, strategies
Secure Session Object pattern, structure
Secure Session pattern
Secure Socket Layer [See SSL (Secure Socket Layer)]
Secure UP
Secure UP, artifacts in
Secure UP, risk analysis
Secure UP, trade-off analysis
SecureBaseAction class
SecureBaseAction class, Authentication Enforcer pattern
SecureBaseAction class, Authorization Enforcer pattern 2nd
SecureBaseAction class, Intercepting Validator pattern
SecureBaseAction class, JAAS Login Module strategy
SecureBaseAction class, with Apache Struts
SecureClassLoader class
SecureID
SecureRandom class
SecureServiceFacade class
SecureSessionFacadeSessionBean.java file
Security Administrator Tool for Analyzing Networks (SATAN) tool
Security Assertion Markup Language [See SAML (Security Assertion Markup Language)]
Security by default 2nd
Security by default, application security
Security by default, business challenges
Security by default, compliance [See Compliance]
Security by default, flaws and exploits
Security by default, four W's
Security by default, identity management
Security by default, Java technology
Security by default, justifications
Security by default, personal identification
Security by default, proactive and reactive
Security by default, references
Security by default, strategies
Security by default, summary
Security by default, weakest links
Security class
Security Context pattern
Security Event Logging pattern
Security factors in security patterns
Security factors in security patterns, Assertion Builder
Security factors in security patterns, Audit Interceptor
Security factors in security patterns, Authentication Enforcer
Security factors in security patterns, Authorization Enforcer
Security factors in security patterns, Container Managed Security
Security factors in security patterns, Credential Tokenizer
Security factors in security patterns, Dynamic Service Management
Security factors in security patterns, Intercepting Validator
Security factors in security patterns, Intercepting Web Agent
Security factors in security patterns, Message Inspector
Security factors in security patterns, Message Interceptor Gateway
Security factors in security patterns, Obfuscated Transfer Object
Security factors in security patterns, Password Synchronizer
Security factors in security patterns, Policy Delegate
Security factors in security patterns, Secure Base Action
Security factors in security patterns, Secure Logger
Security factors in security patterns, Secure Message Router
Security factors in security patterns, Secure Pipe
Security factors in security patterns, Secure Service Facade
Security factors in security patterns, Secure Service Proxy
Security factors in security patterns, Secure Session Object
Security factors in security patterns, Single Sign-on Delegator
Security levels in J2EE network topology
Security patterns
Security patterns in patterns-driven security design
Security patterns, application security assessment model
Security patterns, applying
Security patterns, Business tier 2nd
Security patterns, Business tier, Audit Interceptor
Security patterns, Business tier, best practices
Security patterns, Business tier, Container Managed Security
Security patterns, Business tier, Dynamic Service Management
Security patterns, Business tier, factor analysis
Security patterns, Business tier, Obfuscated Transfer Object
Security patterns, Business tier, overview 2nd
Security patterns, Business tier, pitfalls
Security patterns, Business tier, Policy Delegate
Security patterns, Business tier, references
Security patterns, Business tier, Secure Service Facade
Security patterns, Business tier, Secure Session Object
Security patterns, classification
Security patterns, existing
Security patterns, factor analysis
Security patterns, Identity management 2nd 3rd
Security patterns, Identity management, Assertion Builder
Security patterns, Identity management, best practices
Security patterns, Identity management, Credential Tokenizer pattern
Security patterns, Identity management, pitfalls
Security patterns, Identity management, references
Security patterns, Identity management, Single Sign-on Delegator pattern
Security patterns, in case study 2nd
Security patterns, infrastructure and quality of services
Security patterns, Integration tier
Security patterns, labeling in
Security patterns, policy design in
Security patterns, references
Security patterns, relationships
Security patterns, security provisioning
Security patterns, security provisioning, best practices and pitfalls
Security patterns, security provisioning, Password Synchronizer
Security patterns, threat profiling
Security patterns, tier analysis
Security patterns, trust model
Security patterns, Web services 2nd
Security patterns, Web services, best practices
Security patterns, Web services, Message Inspector
Security patterns, Web services, Message Interceptor Gateway
Security patterns, Web services, pitfalls
Security patterns, Web services, references
Security patterns, Web services, Secure Message Router
Security patterns, Web tier 2nd 3rd
Security patterns, Web tier, Authentication Enforcer
Security patterns, Web tier, Authorization Enforcer
Security patterns, Web tier, best practices
Security patterns, Web tier, Intercepting Validator
Security patterns, Web tier, Intercepting Web Agent
Security patterns, Web tier, references
Security patterns, Web tier, Secure Base Action
Security patterns, Web tier, Secure Logger
Security patterns, Web tier, Secure Pipe
Security patterns, Web tier, Secure Service Proxy
Security principles, references for
Security Provider patterns
Security provisioning
Реклама