Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Audit Interceptor pattern, in case study      2nd 3rd 4th
Audit Interceptor pattern, participants and responsibilities      
Audit Interceptor pattern, problem      
Audit Interceptor pattern, reality check      
Audit Interceptor pattern, related patterns      
Audit Interceptor pattern, sample code      
Audit Interceptor pattern, security factors and risks      
Audit Interceptor pattern, solution      
Audit Interceptor pattern, strategies      
Audit Interceptor pattern, structure      
audit method      
AuditClient.java file      
Auditing      
Auditing, Assertion Builder pattern      
Auditing, Audit Interceptor pattern      [See Audit Interceptor pattern]
Auditing, biometrics      
Auditing, Business tier patterns      2nd 3rd
Auditing, Dynamic Service Management pattern      
Auditing, failures in      
Auditing, identity management      2nd 3rd
Auditing, Secure Service Facade pattern      
Auditing, Secure UP      2nd
Auditing, Security Wheel      
Auditing, Single Sign-on Delegator pattern      
Auditing, Web services      2nd
Auditing, Web tier patterns      2nd
AuditLog class      2nd
AuditLogJdbcDAO class      
AuditRequestMessageBean.java file      
Authentication      
Authentication Enforcer pattern      
Authentication Enforcer pattern, consequences      
Authentication Enforcer pattern, forces      
Authentication Enforcer pattern, in case study      2nd 3rd 4th 5th
Authentication Enforcer pattern, participants and responsibilities      
Authentication Enforcer pattern, problem      
Authentication Enforcer pattern, reality checks in      
Authentication Enforcer pattern, related patterns      
Authentication Enforcer pattern, related patterns, Container Managed Security      
Authentication Enforcer pattern, related patterns, Secure Base Action      
Authentication Enforcer pattern, sample code      
Authentication Enforcer pattern, security factors and risk in      
Authentication Enforcer pattern, solution      
Authentication Enforcer pattern, strategies in      
Authentication Enforcer pattern, structure      
Authentication in security patterns      
Authentication in security patterns, Assertion Builder      2nd
Authentication in security patterns, Authentication Enforcer      [See Authentication Enforcer pattern]
Authentication in security patterns, Business tier      
Authentication in security patterns, Dynamic Service Management      
Authentication in security patterns, Intercepting Web Agent      
Authentication in security patterns, Password Synchronizer      
Authentication in security patterns, Policy Delegate      
Authentication in security patterns, Secure Base Action      
Authentication in security patterns, Secure Service Facade      
Authentication in security patterns, Secure Session Object      
Authentication in security patterns, Web tier      
Authentication in trust model      
Authentication provider-based strategy      
Authentication provider-based strategy, Authentication Enforcer pattern      
Authentication provider-based strategy, JAAS Login Module      
Authentication Request protocol      
Authentication, assessment checklists      
Authentication, biometrics      2nd 3rd 4th
Authentication, broken      2nd 3rd
Authentication, in case study      
Authentication, J2EE      2nd
Authentication, J2EE, agent-based      2nd
Authentication, J2EE, application-based      
Authentication, J2EE, container-based      
Authentication, J2EE, declarative      
Authentication, J2EE, programmatic      
Authentication, J2EE, Web tier      
Authentication, JAAS      
Authentication, JAAS, classes for      
Authentication, JAAS, in clients      
Authentication, JAAS, LoginModule for      2nd
Authentication, JAAS, web-tier      
Authentication, Java code      
Authentication, JMS      
Authentication, JSSE      
Authentication, Liberty Alliance sessions      
Authentication, multi-factor      
Authentication, personal identification      
Authentication, SAML      2nd
Authentication, SAML, assertions in      2nd 3rd
Authentication, SAML, third-party      
Authentication, Security services      
Authentication, Security Wheel      
Authentication, smart cards      2nd 3rd
Authentication, Web services      
AuthenticationEnforcer class      
AuthenticationInstant class      
AuthenticationProvider class      
AuthenticationStatement class      
Authoritative Source of Data pattern      
Authorization      
Authorization and Access Control service      
Authorization Enforcer pattern      
Authorization Enforcer pattern, consequences      
Authorization Enforcer pattern, forces      
Authorization Enforcer pattern, participants and responsibilities      
Authorization Enforcer pattern, problem      
Authorization Enforcer pattern, reality check      
Authorization Enforcer pattern, related patterns      
Authorization Enforcer pattern, security factors and risks      
Authorization Enforcer pattern, solution      
Authorization Enforcer pattern, strategies      
Authorization Enforcer pattern, structure      
Authorization in security patterns      
Authorization in security patterns, Dynamic Service Management      
Authorization in security patterns, Intercepting Web Agent      
Authorization in security patterns, Policy Delegate      
Authorization in security patterns, Secure Base Action      
Authorization in security patterns, Secure Session Object      
Authorization providers      
Authorization, classes for      
authorization, J2EE      2nd 3rd
Authorization, J2EE, declarative      
Authorization, J2EE, programmatic      
Authorization, J2EE, Web tier      
Authorization, JAAS      
Authorization, JAAS, implementing      
Authorization, JAAS, strategy      
authorization, SAML      2nd 3rd
Authorization, Security services      
Authorization, Security Wheel      
Authorization, trust model      
Authorization, Web services      
Authorization, XACML 2.0      
AuthorizationEnforcer class      
AuthPermission class      
Automated back-out strategy      
Automated password retry      
Availability      
Availability, identity management patterns      
Availability, in case study      
Availability, in use cases      
Availability, J2EE network topology      
Availability, Message Interceptor Gateway pattern      
Availability, Secure Message Router pattern      
Availability, security provisioning patterns      
Availability, Security Wheel      
Availability, Web services      
B2B (Business-to-Business) applications      
B2B (Business-to-Business) applications, identity management in      
B2B (Business-to-Business) applications, Liberty Alliance transaction support in      
Back-out password strategy      
Basic authentication      
Basic authentication in web.xml      
Basic authentication, J2EE      2nd
Basic Information      
Basic Profile      
Basics of security      
Basics of security, cryptography      [See Encryption and cryptography]
Basics of security, identity management      
Basics of security, LDAP      [See LDAP (Lightweight Directory Access Protocol)]
Basics of security, references      
Basics of security, requirements and goals      
Basics of security, summary      
Basics of security, threat modeling      
beginHandshake method      
Bertillon, Alphonse      
Best practices      
Best practices, Business tier patterns      
Best practices, Business tier patterns, architecture      
Best practices, Business tier patterns, infrastructure      
Best practices, Business tier patterns, policy      
Best practices, Identity management patterns      
Best practices, personal identification      
Best practices, personal identification, biometrics      
Best practices, personal identification, smart cards      
Best practices, security provisioning patterns      
Best practices, security provisioning patterns, application design      
Best practices, security provisioning patterns, quality of service      
Best practices, security provisioning patterns, risk mitigation      
Best practices, security provisioning patterns, server sizing      
Best practices, Web services patterns      
Best practices, Web services patterns, communication and message security      
Best practices, Web services patterns, infrastructure      
Best practices, Web services patterns, testing and deployment      
Best practices, Web tier patterns      
Best practices, Web tier patterns, applications      
Best practices, Web tier patterns, communication      
Best practices, Web tier patterns, infrastructure      
Binary security tokens      
BinaryToken class      
BIND requests      
BioAPI standard      2nd
Biometric identification and authentication      2nd 3rd
Biometric identification and authentication, accuracy      
Biometric identification and authentication, architecture and implementation      
Biometric identification and authentication, best practices      
Biometric identification and authentication, in multi-factor authentication      
Biometric identification and authentication, operational models      
Biometric identification and authentication, SSO strategy      
Biometric identification and authentication, verification process      
Biometric service providers (BSPs)      
black box testing      
Black box testing in case study      
Black box testing, Secure UP      2nd 3rd
Blanket MIDlets      
Block ciphers      
Block encryption algorithms      
Bodies in SOAP messages      
Broken access control risk      
Broken authentication      
Broken authentication, Assertion Builder pattern      
Broken authentication, Password Synchronizer pattern      
Browser plug-ins      
Browser plug-ins for biometrics      
Browser plug-ins for smart cards      
brute force attacks      
BSPs (biometric service providers)      
Buffer overflow      
Build portion in patterns-driven security design      
Build vs. buy decisions      
Build vs. buy decisions, Assertion Builder pattern      
Build vs. buy decisions, Business tier pattern      
Build vs. buy decisions, Intercepting Web Agent pattern      
Build vs. buy decisions, Password Synchronizer pattern      
Built-in Java security model      
Business and business challenges      
Business and business challenges, in case study      
Business and business challenges, processing logic      
Business and business challenges, service provisioning      
Business and business challenges, tasks auditing      
Business Delegate pattern      
Business Delegate pattern and Delegate pattern      
Business Delegate pattern and Single Sign-on Delegator pattern      
Business Delegate pattern and Synchronizer pattern      
Business tier      
Business tier in case study      2nd 3rd
Business tier in J2EE      [See EJB tier in J2EE]
Business tier, reality checks for      
Business tier, security patterns      2nd
Business tier, security patterns, Audit Interceptor      
Business tier, security patterns, best practices      
Business tier, security patterns, Container Managed Security      
Business tier, security patterns, Dynamic Service Management      
Business tier, security patterns, factor analysis      
Business tier, security patterns, Obfuscated Transfer Object      
Business tier, security patterns, overview      2nd
Business tier, security patterns, pitfalls      
Business tier, security patterns, Policy Delegate      
Business tier, security patterns, references      
Business tier, security patterns, Secure Service Facade      
Business tier, security patterns, Secure Session Object      
Business-to-Business (B2B) applications      
Business-to-Business (B2B) applications, identity management in      
Business-to-Business (B2B) applications, Liberty Alliance transaction support in      
Bytecode verifiers      
CA (connector architecture)      
CA SiteMinder WebAgent      
Caching in Single Sign-on Delegator pattern      
CADs (card acceptance devices)      
Caesar ciphers      
California, notice of security breach requirements      
CallbackHandler class      2nd 3rd 4th 5th
Callbacks in J2EE      
Canadian Public Accounting Board      
Canonical transformations      
Canonicalization algorithms      2nd
CAP (Converted Applet) files      
Capacitance-based scanners      
Capstone project      
Card acceptance devices (CADs)      2nd
Card Unique Identifiers (CUIDs)      
Cards, smart cards      [See Smart cards]
CAs (Certificates of Authority)      
CAs (Certificates of Authority), CertPath      
CAs (Certificates of Authority), for certificates      
CAs (Certificates of Authority), for certificates, issuing      
CAs (Certificates of Authority), for certificates, revoking      
CAs (Certificates of Authority), for signed applets      
CAs (Certificates of Authority), J2EE      
Case study      
Case study, architecture      2nd 3rd
Case study, assumptions      
Case study, challenges      
Case study, conceptual security model      
Case study, conclusion      
Case study, deployment      
Case study, design      
Case study, design, Business tier      2nd
Case study, design, classes in      
Case study, design, data modeling and objects      
Case study, design, factor analysis      
Case study, design, Identity tier      
Case study, design, infrastructure      
Case study, design, policy      
Case study, design, security patterns      
Case study, design, services in      
Case study, design, threat profiling      
Case study, design, tier analysis      
Case study, design, trust model      
Case study, design, Web Services tier      2nd
Case study, design, Web tier      2nd
Case study, development      
Case study, lessons learned      
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте