Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
URLClassLoader class      
URLConnection timeouts      
use cases      
Use cases, actors      
Use cases, diagrams      
Use cases, in Secure UP      
Use cases, methodology choices      
Use cases, online portals      2nd
Use cases, requirements identification      
Use cases, system constraints      
Use cases, system environment      
User account provisioning      2nd
User account provisioning, approaches to      
User account provisioning, architecture      
User account provisioning, architecture, centralized model vs. decentralized      
User account provisioning, architecture, components of      
User account provisioning, architecture, logical      
User account provisioning, differentiators for      
User account provisioning, identity management      
User account provisioning, identity provider infrastructure integration      
User account provisioning, portal integration      
User account provisioning, scenario      
User account provisioning, services      
User agents      
User login
User login in case study      
User login, biometrics      
User login, use case      
Usernames      
Usernames, JAAS authorization
Usernames, WS-Security      
UsernameToken class      2nd
Users in J2EE
UserStore class      
UUID pattern and profile
UUID pattern and profile, SAML
UUID pattern and profile, Secure Logger pattern
validate method
Validate service
validateSecurityContext method
validateSecurityToken method      
Validation      
Validation in security patterns      
Validation in security patterns, Business tier      
Validation in security patterns, Intercepting Validator      [See Intercepting Validator pattern]
Validation in security patterns, Policy Delegate      
Validation in security patterns, Secure Base Action      
Validation in security patterns, Secure Service Facade      
Validation in security patterns, Web services
Validation in security patterns, Web tier
Validation, certificate chains      
Validation, failures
Validation, in case study      
Validation, Liberty Phase 1      
Validation, X-KISS      
Validation, XML signatures
Variables in Java      
Vendor-independent security
Vendor-neutral credential handler      
Vendor-specific security
Vendor-specific security, session management
Vendor-specific security, Web services APIs      
Vendors
Vendors, password management
Vendors, service provisioning      
Verification      
Verification, biometric      
Verification, certificate chains
Verification, host name      
Verification, jar files
Verification, signatures      2nd
Verification, Web tier patterns
verify method      
VeriSign CA      2nd
Version numbers in XACML
Vertical scalability in J2EE network topology
viewResult method
Virtual machines
virtual machines, CVM
virtual machines, JVM      
virtual machines, KVM      
VLANs
Voice verification      
VPN access      
Vulnerabilities, Web services      
Watermarking Java code
Weakest links      
Web
Web browser SSO Profile
Web of trust models
Web services definition language (WSDL)      2nd 3rd 4th
Web Services Interoperability Organization (WS-I)
Web Services Policy Framework (WS-Policy)      
Web services policy language (WSPL)      
Web services tier      2nd 3rd
Web services tier in case study      2nd 3rd 4th
Web services tier in J2EE      
Web services tier in Liberty Alliance      2nd
Web services tier, architecture and building blocks
Web services tier, communication styles
Web services tier, core issues      
Web services tier, infrastructure
Web services tier, Java-based providers      
Web services tier, message-layer security
Web services tier, network-layer security
Web services tier, operational model
Web services tier, policies      2nd 3rd
Web services tier, protocols stack
Web services tier, references
Web services tier, requirements
Web services tier, SAML in
Web services tier, security patterns      2nd 3rd
Web services tier, security patterns, best practices
Web services tier, security patterns, factor analysis
Web services tier, security patterns, Message Inspector
Web services tier, security patterns, Message Interceptor Gateway      
Web services tier, security patterns, pitfalls      
Web services tier, security patterns, references
Web services tier, security patterns, Secure Message Router
Web services tier, standards      2nd
Web services tier, standards, WS-Security      [See WS-Security]
Web services tier, standards, XML      [See XML (Extensible Markup Language)]
Web services tier, summary
Web services tier, Transport-Layer Security
Web services tier, WS-I security profile
Web tier      
Web tier in case study      2nd 3rd
Web tier in J2EE      2nd
Web tier in J2EE, authentication
Web tier in J2EE, authorization
Web tier in J2EE, context propagation from
Web tier in J2EE, HTTP session tracking
Web tier, container managed security strategy
Web tier, reality checks for      
Web tier, security patterns      2nd 3rd
Web tier, security patterns, Authentication Enforcer
Web tier, security patterns, Authorization Enforcer
Web tier, security patterns, best practices
Web tier, security patterns, factor analysis
Web tier, security patterns, Intercepting Validator
Web tier, security patterns, Intercepting Web Agent
Web tier, security patterns, references
Web tier, security patterns, Secure Base Action
Web tier, security patterns, Secure Logger
Web tier, security patterns, Secure Pipe
Web tier, security patterns, Secure Service Proxy
Web, application load-balancing
Web, authentication
Web, redirection      
Web, servers
Web, servers in SSL
Web, servers in use cases
Web, servers, Web tier patterns
web, services      [See Web services tier]
Web, validation
Web, Web tier patterns      [See Web tier]
Web, Web-based transactions      [See Secure Pipe pattern]
Web.xml file
Web.xml file, basic HTTP authentication entry      
Web.xml file, client certificate based authentication entry      
Web.xml file, deployment descriptor      
Web.xml file, form based authentication entry      
WebAgent class
WebAgent class in case study
WebAgent class, Single Sign-on Delegator pattern      2nd
Wheel edge in Security Wheel
Where in security
Which in security
White box testing
White box testing in case study      
White box testing, Secure UP      2nd 3rd
Who in security      
Why in security
Wireless Toolkit (WTK)      2nd
Wireless Transport Layer Security (WTLS)      
Workflow engine      
WorkflowRecipient class
wrap method      2nd
WriteAppletPolicy.policy file      
WriteFileApplet.html file
WriteFileApplet.java file      2nd
WS-I (Web Services Interoperability Organization)
WS-I Security profiles      
WS-Policy (Web Services Policy Framework)
WS-Security      
WS-Security in JWSDP
WS-Security, definitions      
WS-Security, encryption      2nd
WS-Security, motivation
WS-Security, namespaces
WS-Security, SAML and REL in
WS-Security, signatures      
WS-Security, SOAP messages
WS-Security, tokens
WSDL (Web Services Definition Language)      2nd 3rd 4th
WSPL (Web services policy language)
WTK (Wireless Toolkit)      2nd
WTLS (Wireless Transport Layer Security)
X-BULK
X-KISS (XML key information services)
X-KISS (XML key information services), locate service      
X-KISS (XML key information services), validate service
X-KRSS (XML key registration service)
X-KRSS (XML key registration service), recovery
X-KRSS (XML key registration service), registration      
X-KRSS (XML key registration service), reissue      
X-KRSS (XML key registration service), revocation      
X.500/LDAP Profile      
X.509 certificates      [See Certificates and certificate keys]
X509v3CertToken      
XACML (Extensible Access Control Markup Language)      
XACML kit      2nd
XACML Profile      
XACML, access control and policy management
XACML, architecture
XACML, data flow      
XACML, usage scenarios      
XACML, usage scenarios, ebXML registry      
XACML, usage scenarios, policy centralization
XACML, usage scenarios, policy stores
XACML, usage scenarios, SAML collaboration
XACML, usage scenarios, sample policy
XACML, usage scenarios, sample requests      
XACML, usage scenarios, sample scenario      
XACML, usage scenarios, XACML 2.0 with SAML 2.0      
XACML, usage scenarios, XACML Kit      
XACML, vs. EPAL
XACML, WSPL from      
XACML, XACML 2.0      
XACML, XML schema definition      
XCBF (XML Common Biometric Format)      
XKMS (XML key management system)      2nd
XKMS, issues
XKMS, motivation      
XKMS, specification overview      
XKMS, Verisign services      
XKMS, X-BULK      
XKMS, X-KISS      
XKMS, X-KISS, locate service      
XKMS, X-KISS, validate service      
XKMS, X-KRSS      [See X-KRSS (XML key registration service)]
XLST transform algorithms      
XML (Extensible Markup Language)      
XML Common Biometric Format (XCBF)      
XML Denial of Service (XML-DOS) attacks      
XML Digital Signature algorithm      
XML in J2EE      
XML in Message Inspector pattern      
XML in Message Interceptor Gateway pattern      
XML key information services (X-KISS)      
XML key information services (X-KISS), locate service      
XML key information services (X-KISS), validate service      
XML key management system      [See XKMS (XML key management system)]
XML key registration service (X-KRSS)      
XML key registration service (X-KRSS), recovery      
XML key registration service (X-KRSS), registration      
XML key registration service (X-KRSS), reissue      
XML key registration service (X-KRSS), revocation      
XML messaging provider strategy      
XML Schemas      2nd
XML Schemas in Message Inspector pattern      
XML Schemas in Message Interceptor Gateway pattern      
XML Schemas, for XACML      
XML, encryption      
XML, encryption, algorithms      
XML, encryption, anatomy      
XML, encryption, arbitrary content      
XML, encryption, element level      
XML, encryption, example scenarios      
XML, encryption, motivation      
XML, encryption, super encryption      
XML, firewalls      
XML, firewalls for performance      
XML, firewalls for Web Services      
XML, signatures      
XML, signatures, algorithms      
XML, signatures, anatomy      
XML, signatures, Assertion Builder pattern      
XML, signatures, creating      
XML, signatures, examples      
XML, signatures, in SAML      
XML, signatures, motivation      
XML, signatures, verifying and validating      
XML, XACML for      
XML-aware security      
XML-aware security, infrastructure      
XML-aware security, Message Inspector pattern      
XML-aware security, Message Interceptor Gateway pattern      
Xpath transform algorithms      
XrML (Extensible Rights Markup Language)      
XSS (cross-site scripting)      
Xverify command      
Yarrow random number generator      
Zero knowledge testing      
Zimmerman, Phil      
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2025
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте