Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
SAML, profiles      2nd 3rd
SAML, request-reply model      
SAML, SAML 1.0      2nd
SAML, SAML 1.1      
SAML, SAML 2.0      2nd 3rd
SAML, SSO in      2nd
SAML, usage scenarios      
SAML, usage scenarios, DOS attacks      
SAML, usage scenarios, global logout      
SAML, usage scenarios, man-in-the-middle attacks      
SAML, usage scenarios, message replay and message modification      
SAML, usage scenarios, third-party authentication and authorization      
SAML, XML signatures in      
Sample code for security patterns      
Sample code for security patterns, Assertion Builder      
Sample code for security patterns, Audit Interceptor      
Sample code for security patterns, Authentication Enforcer      
Sample code for security patterns, Container Managed Security      
Sample code for security patterns, Credential Tokenizer pattern      
Sample code for security patterns, Dynamic Service Management      
Sample code for security patterns, Intercepting Web Agent      
Sample code for security patterns, Obfuscated Transfer Object      
Sample code for security patterns, Password Synchronizer      
Sample code for security patterns, Policy Delegate      
Sample code for security patterns, Secure Base Action      
Sample code for security patterns, Secure Logger      
Sample code for security patterns, Secure Pipe      
Sample code for security patterns, Secure Service Facade      
Sample code for security patterns, Secure Service Proxy      
Sample code for security patterns, Secure Session Object      
Sample code for security patterns, Single Sign-on Delegator      
SampleAuthorizationEnforcer.java file      
Sarbanes-Oxley Act (SOX)      
Sarbanes-Oxley Act (SOX), identity protection in      2nd
Sarbanes-Oxley Act (SOX), in security provisioning patterns      
SASL (Simple Authentication and Security Layer) API      
SASL (Simple Authentication and Security Layer) API, clients      2nd
SASL (Simple Authentication and Security Layer) API, installing      
SASL (Simple Authentication and Security Layer) API, servers      
SATAN (Security Administrator Tool for Analyzing Networks) tool      
SBU (Sensitive But Unclassified) information      
Scalability      
Scalability in security patterns      
Scalability in security patterns, Intercepting Web Agent      
Scalability in security patterns, Secure Message Router      
Scalability in security patterns, Secure Service Proxy      
Scalability in security patterns, security provisioning      
Scalability in security patterns, Single Sign-on Delegator      
Scalability, J2EE network topology      
Scalability, J2EE network topology, horizontal      
Scalability, J2EE network topology, vertical      
sCallerInRole method      
Scanners      
Scanners in biometrics      
Scanners, fingerprint      
Scanning data protection      [See Intercepting Validator pattern]
Scope      
Scope, Liberty Alliance      
Scope, service provisioning      
Screen display messages      
Scripting, cross-site      
seal method      
Sealed objects      
SealedObject class      
Search operations in SPML      
SearchRequest message      
Secret data      
Secret keys in assessment checklists      
SecretKeyFactory class      
Secure Association patterns      
Secure Base Action pattern      2nd
Secure Base Action pattern, and Policy Delegate pattern      
Secure Base Action pattern, consequences      
Secure Base Action pattern, forces      
Secure Base Action pattern, in case study      2nd 3rd 4th
Secure Base Action pattern, participants and responsibilities      2nd
Secure Base Action pattern, problem      
Secure Base Action pattern, reality checks      
Secure Base Action pattern, related patterns      
Secure Base Action pattern, sample code      
Secure Base Action pattern, security factors and risk      
Secure Base Action pattern, solution      
Secure Base Action pattern, strategies      
Secure Base Action pattern, structure      
Secure Communication patterns      
Secure data logger strategy      
Secure log store strategy      
Secure Logger pattern      2nd
Secure Logger pattern, consequences      2nd
Secure Logger pattern, forces      
Secure Logger pattern, in case study      2nd 3rd
Secure Logger pattern, participants and responsibilities      
Secure Logger pattern, problem      
Secure Logger pattern, reality check      
Secure Logger pattern, related patterns
Secure Logger pattern, related patterns, Message Inspector
Secure Logger pattern, related patterns, Secure Base Action      
Secure Logger pattern, sample code
Secure Logger pattern, security factors and risks      
Secure Logger pattern, solution      
Secure Logger pattern, strategies
Secure Logger pattern, structure
Secure Message Interceptor pattern
Secure Message Router pattern
Secure Message Router pattern, consequences
Secure Message Router pattern, forces
Secure Message Router pattern, in case study      2nd 3rd 4th
Secure Message Router pattern, participants and responsibilities
Secure Message Router pattern, problem
Secure Message Router pattern, reality check
Secure Message Router pattern, related patterns      
Secure Message Router pattern, related patterns, Message Interceptor Gateway      
Secure Message Router pattern, related patterns, Secure Service Proxy
Secure Message Router pattern, security factors and risks
Secure Message Router pattern, solution      
Secure Message Router pattern, strategies
Secure Message Router pattern, structure
Secure Pipe pattern      2nd 3rd
Secure Pipe pattern, consequences
Secure Pipe pattern, forces      
Secure Pipe pattern, in case study      2nd 3rd 4th
Secure Pipe pattern, in secure log store strategy      2nd
Secure Pipe pattern, participants and responsibilities      
Secure Pipe pattern, problem
Secure Pipe pattern, reality check      
Secure Pipe pattern, related patterns      
Secure Pipe pattern, related patterns, Authentication Enforcer
Secure Pipe pattern, related patterns, Credential Tokenizer
Secure Pipe pattern, related patterns, Dynamic Service Management
Secure Pipe pattern, related patterns, Secure Logger
Secure Pipe pattern, sample code
Secure Pipe pattern, security factors and risks
Secure Pipe pattern, solution      
Secure Pipe pattern, strategies      
Secure Pipe pattern, structure
Secure Service Facade pattern      2nd 3rd
Secure Service Facade pattern, consequences      
Secure Service Facade pattern, forces      
Secure Service Facade pattern, in case study      
Secure Service Facade pattern, participants and responsibilities      2nd
Secure Service Facade pattern, problem
Secure Service Facade pattern, reality check
Secure Service Facade pattern, related patterns
Secure Service Facade pattern, sample code
Secure Service Facade pattern, security factors and risks      
Secure Service Facade pattern, solution
Secure Service Facade pattern, strategies
Secure Service Facade pattern, structure
Secure Service Proxy pattern
Secure Service Proxy pattern, consequences      
Secure Service Proxy pattern, forces
Secure Service Proxy pattern, participants and responsibilities      
Secure Service Proxy pattern, problem
Secure Service Proxy pattern, reality check      
Secure Service Proxy pattern, related patterns      
Secure Service Proxy pattern, related patterns, Container Managed Security
Secure Service Proxy pattern, related patterns, Intercepting Web Agent      
Secure Service Proxy pattern, related patterns, Secure Service Facade
Secure Service Proxy pattern, sample code
Secure Service Proxy pattern, security factors and risks
Secure Service Proxy pattern, solution
Secure Service Proxy pattern, strategies      
Secure Service Proxy pattern, structure      
Secure service proxy single service strategy
Secure Session Facade pattern      2nd
Secure Session Manager      2nd
Secure Session Object pattern
Secure Session Object pattern, consequences      
Secure Session Object pattern, forces      
Secure Session Object pattern, participants and responsibilities
Secure Session Object pattern, problem      
Secure Session Object pattern, reality check
Secure Session Object pattern, related patterns
Secure Session Object pattern, sample code
Secure Session Object pattern, security factors and risks      
Secure Session Object pattern, solution      
Secure Session Object pattern, strategies
Secure Session Object pattern, structure
Secure Session pattern
Secure Socket Layer      [See SSL (Secure Socket Layer)]
Secure UP
Secure UP, artifacts in
Secure UP, risk analysis
Secure UP, trade-off analysis
SecureBaseAction class
SecureBaseAction class, Authentication Enforcer pattern
SecureBaseAction class, Authorization Enforcer pattern      2nd
SecureBaseAction class, Intercepting Validator pattern      
SecureBaseAction class, JAAS Login Module strategy
SecureBaseAction class, with Apache Struts
SecureClassLoader class
SecureID      
SecureRandom class
SecureServiceFacade class
SecureSessionFacadeSessionBean.java file      
Security Administrator Tool for Analyzing Networks (SATAN) tool
Security Assertion Markup Language      [See SAML (Security Assertion Markup Language)]
Security by default      2nd
Security by default, application security
Security by default, business challenges
Security by default, compliance      [See Compliance]
Security by default, flaws and exploits      
Security by default, four W's
Security by default, identity management
Security by default, Java technology
Security by default, justifications
Security by default, personal identification
Security by default, proactive and reactive      
Security by default, references
Security by default, strategies
Security by default, summary
Security by default, weakest links
Security class
Security Context pattern
Security Event Logging pattern
Security factors in security patterns
Security factors in security patterns, Assertion Builder
Security factors in security patterns, Audit Interceptor
Security factors in security patterns, Authentication Enforcer
Security factors in security patterns, Authorization Enforcer
Security factors in security patterns, Container Managed Security
Security factors in security patterns, Credential Tokenizer
Security factors in security patterns, Dynamic Service Management
Security factors in security patterns, Intercepting Validator
Security factors in security patterns, Intercepting Web Agent
Security factors in security patterns, Message Inspector
Security factors in security patterns, Message Interceptor Gateway
Security factors in security patterns, Obfuscated Transfer Object
Security factors in security patterns, Password Synchronizer
Security factors in security patterns, Policy Delegate
Security factors in security patterns, Secure Base Action
Security factors in security patterns, Secure Logger
Security factors in security patterns, Secure Message Router
Security factors in security patterns, Secure Pipe
Security factors in security patterns, Secure Service Facade      
Security factors in security patterns, Secure Service Proxy      
Security factors in security patterns, Secure Session Object      
Security factors in security patterns, Single Sign-on Delegator      
Security levels in J2EE network topology
Security patterns      
Security patterns in patterns-driven security design
Security patterns, application security assessment model
Security patterns, applying      
Security patterns, Business tier      2nd
Security patterns, Business tier, Audit Interceptor
Security patterns, Business tier, best practices
Security patterns, Business tier, Container Managed Security      
Security patterns, Business tier, Dynamic Service Management      
Security patterns, Business tier, factor analysis
Security patterns, Business tier, Obfuscated Transfer Object
Security patterns, Business tier, overview      2nd
Security patterns, Business tier, pitfalls
Security patterns, Business tier, Policy Delegate
Security patterns, Business tier, references      
Security patterns, Business tier, Secure Service Facade      
Security patterns, Business tier, Secure Session Object
Security patterns, classification
Security patterns, existing      
Security patterns, factor analysis
Security patterns, Identity management      2nd 3rd
Security patterns, Identity management, Assertion Builder      
Security patterns, Identity management, best practices      
Security patterns, Identity management, Credential Tokenizer pattern      
Security patterns, Identity management, pitfalls      
Security patterns, Identity management, references      
Security patterns, Identity management, Single Sign-on Delegator pattern      
Security patterns, in case study      2nd
Security patterns, infrastructure and quality of services      
Security patterns, Integration tier      
Security patterns, labeling in      
Security patterns, policy design in      
Security patterns, references
Security patterns, relationships
Security patterns, security provisioning
Security patterns, security provisioning, best practices and pitfalls
Security patterns, security provisioning, Password Synchronizer      
Security patterns, threat profiling      
Security patterns, tier analysis      
Security patterns, trust model      
Security patterns, Web services      2nd
Security patterns, Web services, best practices      
Security patterns, Web services, Message Inspector      
Security patterns, Web services, Message Interceptor Gateway      
Security patterns, Web services, pitfalls      
Security patterns, Web services, references      
Security patterns, Web services, Secure Message Router      
Security patterns, Web tier      2nd 3rd
Security patterns, Web tier, Authentication Enforcer      
Security patterns, Web tier, Authorization Enforcer      
Security patterns, Web tier, best practices      
Security patterns, Web tier, Intercepting Validator      
Security patterns, Web tier, Intercepting Web Agent      
Security patterns, Web tier, references      
Security patterns, Web tier, Secure Base Action      
Security patterns, Web tier, Secure Logger      
Security patterns, Web tier, Secure Pipe
Security patterns, Web tier, Secure Service Proxy      
Security principles, references for      
Security Provider patterns      
Security provisioning      
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2025
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте