Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
URLClassLoader class      
URLConnection timeouts      
use cases      
Use cases, actors      
Use cases, diagrams      
Use cases, in Secure UP      
Use cases, methodology choices      
Use cases, online portals      2nd
Use cases, requirements identification      
Use cases, system constraints      
Use cases, system environment      
User account provisioning      2nd
User account provisioning, approaches to      
User account provisioning, architecture      
User account provisioning, architecture, centralized model vs. decentralized      
User account provisioning, architecture, components of      
User account provisioning, architecture, logical      
User account provisioning, differentiators for      
User account provisioning, identity management      
User account provisioning, identity provider infrastructure integration      
User account provisioning, portal integration      
User account provisioning, scenario      
User account provisioning, services      
User agents      
User login      
User login in case study      
User login, biometrics      
User login, use case      
Usernames      
Usernames, JAAS authorization      
Usernames, WS-Security      
UsernameToken class      2nd
Users in J2EE      
UserStore class      
UUID pattern and profile      
UUID pattern and profile, SAML      
UUID pattern and profile, Secure Logger pattern      
validate method      
Validate service      
validateSecurityContext method      
validateSecurityToken method      
Validation      
Validation in security patterns      
Validation in security patterns, Business tier      
Validation in security patterns, Intercepting Validator      [See Intercepting Validator pattern]
Validation in security patterns, Policy Delegate      
Validation in security patterns, Secure Base Action      
Validation in security patterns, Secure Service Facade      
Validation in security patterns, Web services      
Validation in security patterns, Web tier      
Validation, certificate chains      
Validation, failures      
Validation, in case study      
Validation, Liberty Phase 1      
Validation, X-KISS      
Validation, XML signatures      
Variables in Java      
Vendor-independent security      
Vendor-neutral credential handler      
Vendor-specific security      
Vendor-specific security, session management      
Vendor-specific security, Web services APIs      
Vendors      
Vendors, password management      
Vendors, service provisioning      
Verification      
Verification, biometric      
Verification, certificate chains      
Verification, host name      
Verification, jar files      
Verification, signatures      2nd
Verification, Web tier patterns      
verify method      
VeriSign CA      2nd
Version numbers in XACML      
Vertical scalability in J2EE network topology      
viewResult method      
Virtual machines      
virtual machines, CVM      
virtual machines, JVM      
virtual machines, KVM      
VLANs      
Voice verification      
VPN access      
Vulnerabilities, Web services      
Watermarking Java code      
Weakest links      
Web      
Web browser SSO Profile      
Web of trust models      
Web services definition language (WSDL)      2nd 3rd 4th
Web Services Interoperability Organization (WS-I)      
Web Services Policy Framework (WS-Policy)      
Web services policy language (WSPL)      
Web services tier      2nd 3rd
Web services tier in case study      2nd 3rd 4th
Web services tier in J2EE      
Web services tier in Liberty Alliance      2nd
Web services tier, architecture and building blocks      
Web services tier, communication styles      
Web services tier, core issues      
Web services tier, infrastructure      
Web services tier, Java-based providers      
Web services tier, message-layer security      
Web services tier, network-layer security      
Web services tier, operational model      
Web services tier, policies      2nd 3rd
Web services tier, protocols stack      
Web services tier, references      
Web services tier, requirements      
Web services tier, SAML in      
Web services tier, security patterns      2nd 3rd
Web services tier, security patterns, best practices      
Web services tier, security patterns, factor analysis      
Web services tier, security patterns, Message Inspector      
Web services tier, security patterns, Message Interceptor Gateway      
Web services tier, security patterns, pitfalls      
Web services tier, security patterns, references      
Web services tier, security patterns, Secure Message Router      
Web services tier, standards      2nd
Web services tier, standards, WS-Security      [See WS-Security]
Web services tier, standards, XML      [See XML (Extensible Markup Language)]
Web services tier, summary      
Web services tier, Transport-Layer Security      
Web services tier, WS-I security profile      
Web tier      
Web tier in case study      2nd 3rd
Web tier in J2EE      2nd
Web tier in J2EE, authentication      
Web tier in J2EE, authorization      
Web tier in J2EE, context propagation from      
Web tier in J2EE, HTTP session tracking      
Web tier, container managed security strategy      
Web tier, reality checks for      
Web tier, security patterns      2nd 3rd
Web tier, security patterns, Authentication Enforcer      
Web tier, security patterns, Authorization Enforcer      
Web tier, security patterns, best practices      
Web tier, security patterns, factor analysis      
Web tier, security patterns, Intercepting Validator      
Web tier, security patterns, Intercepting Web Agent      
Web tier, security patterns, references      
Web tier, security patterns, Secure Base Action      
Web tier, security patterns, Secure Logger      
Web tier, security patterns, Secure Pipe      
Web tier, security patterns, Secure Service Proxy      
Web, application load-balancing      
Web, authentication      
Web, redirection      
Web, servers      
Web, servers in SSL      
Web, servers in use cases      
Web, servers, Web tier patterns      
web, services      [See Web services tier]
Web, validation      
Web, Web tier patterns      [See Web tier]
Web, Web-based transactions      [See Secure Pipe pattern]
Web.xml file      
Web.xml file, basic HTTP authentication entry      
Web.xml file, client certificate based authentication entry      
Web.xml file, deployment descriptor      
Web.xml file, form based authentication entry      
WebAgent class      
WebAgent class in case study      
WebAgent class, Single Sign-on Delegator pattern      2nd
Wheel edge in Security Wheel      
Where in security      
Which in security      
White box testing      
White box testing in case study      
White box testing, Secure UP      2nd 3rd
Who in security      
Why in security      
Wireless Toolkit (WTK)      2nd
Wireless Transport Layer Security (WTLS)      
Workflow engine      
WorkflowRecipient class      
wrap method      2nd
WriteAppletPolicy.policy file      
WriteFileApplet.html file      
WriteFileApplet.java file      2nd
WS-I (Web Services Interoperability Organization)      
WS-I Security profiles      
WS-Policy (Web Services Policy Framework)      
WS-Security      
WS-Security in JWSDP      
WS-Security, definitions      
WS-Security, encryption      2nd
WS-Security, motivation      
WS-Security, namespaces      
WS-Security, SAML and REL in      
WS-Security, signatures      
WS-Security, SOAP messages      
WS-Security, tokens      
WSDL (Web Services Definition Language)      2nd 3rd 4th
WSPL (Web services policy language)      
WTK (Wireless Toolkit)      2nd
WTLS (Wireless Transport Layer Security)      
X-BULK      
X-KISS (XML key information services)      
X-KISS (XML key information services), locate service      
X-KISS (XML key information services), validate service      
X-KRSS (XML key registration service)      
X-KRSS (XML key registration service), recovery      
X-KRSS (XML key registration service), registration      
X-KRSS (XML key registration service), reissue      
X-KRSS (XML key registration service), revocation      
X.500/LDAP Profile      
X.509 certificates      [See Certificates and certificate keys]
X509v3CertToken      
XACML (Extensible Access Control Markup Language)      
XACML kit      2nd
XACML Profile      
XACML, access control and policy management      
XACML, architecture      
XACML, data flow      
XACML, usage scenarios      
XACML, usage scenarios, ebXML registry      
XACML, usage scenarios, policy centralization      
XACML, usage scenarios, policy stores      
XACML, usage scenarios, SAML collaboration      
XACML, usage scenarios, sample policy      
XACML, usage scenarios, sample requests      
XACML, usage scenarios, sample scenario      
XACML, usage scenarios, XACML 2.0 with SAML 2.0      
XACML, usage scenarios, XACML Kit      
XACML, vs. EPAL      
XACML, WSPL from      
XACML, XACML 2.0      
XACML, XML schema definition      
XCBF (XML Common Biometric Format)      
XKMS (XML key management system)      2nd
XKMS, issues      
XKMS, motivation      
XKMS, specification overview      
XKMS, Verisign services      
XKMS, X-BULK      
XKMS, X-KISS      
XKMS, X-KISS, locate service      
XKMS, X-KISS, validate service      
XKMS, X-KRSS      [See X-KRSS (XML key registration service)]
XLST transform algorithms      
XML (Extensible Markup Language)      
XML Common Biometric Format (XCBF)      
XML Denial of Service (XML-DOS) attacks      
XML Digital Signature algorithm      
XML in J2EE      
XML in Message Inspector pattern      
XML in Message Interceptor Gateway pattern      
XML key information services (X-KISS)      
XML key information services (X-KISS), locate service      
XML key information services (X-KISS), validate service      
XML key management system      [See XKMS (XML key management system)]
XML key registration service (X-KRSS)      
XML key registration service (X-KRSS), recovery      
XML key registration service (X-KRSS), registration      
XML key registration service (X-KRSS), reissue      
XML key registration service (X-KRSS), revocation      
XML messaging provider strategy      
XML Schemas      2nd
XML Schemas in Message Inspector pattern      
XML Schemas in Message Interceptor Gateway pattern      
XML Schemas, for XACML      
XML, encryption      
XML, encryption, algorithms      
XML, encryption, anatomy      
XML, encryption, arbitrary content      
XML, encryption, element level      
XML, encryption, example scenarios      
XML, encryption, motivation      
XML, encryption, super encryption      
XML, firewalls      
XML, firewalls for performance      
XML, firewalls for Web Services      
XML, signatures      
XML, signatures, algorithms      
XML, signatures, anatomy      
XML, signatures, Assertion Builder pattern      
XML, signatures, creating      
XML, signatures, examples      
XML, signatures, in SAML      
XML, signatures, motivation      
XML, signatures, verifying and validating      
XML, XACML for      
XML-aware security      
XML-aware security, infrastructure      
XML-aware security, Message Inspector pattern      
XML-aware security, Message Interceptor Gateway pattern      
Xpath transform algorithms      
XrML (Extensible Rights Markup Language)      
XSS (cross-site scripting)      
Xverify command      
Yarrow random number generator      
Zero knowledge testing      
Zimmerman, Phil      
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте