Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Audit Interceptor pattern, in case study      2nd 3rd 4th
Audit Interceptor pattern, participants and responsibilities      
Audit Interceptor pattern, problem
Audit Interceptor pattern, reality check      
Audit Interceptor pattern, related patterns      
Audit Interceptor pattern, sample code
Audit Interceptor pattern, security factors and risks
Audit Interceptor pattern, solution      
Audit Interceptor pattern, strategies      
Audit Interceptor pattern, structure
audit method
AuditClient.java file
Auditing
Auditing, Assertion Builder pattern      
Auditing, Audit Interceptor pattern      [See Audit Interceptor pattern]
Auditing, biometrics
Auditing, Business tier patterns      2nd 3rd
Auditing, Dynamic Service Management pattern      
Auditing, failures in      
Auditing, identity management      2nd 3rd
Auditing, Secure Service Facade pattern      
Auditing, Secure UP      2nd
Auditing, Security Wheel      
Auditing, Single Sign-on Delegator pattern
Auditing, Web services      2nd
Auditing, Web tier patterns      2nd
AuditLog class      2nd
AuditLogJdbcDAO class      
AuditRequestMessageBean.java file      
Authentication      
Authentication Enforcer pattern      
Authentication Enforcer pattern, consequences
Authentication Enforcer pattern, forces      
Authentication Enforcer pattern, in case study      2nd 3rd 4th 5th
Authentication Enforcer pattern, participants and responsibilities      
Authentication Enforcer pattern, problem      
Authentication Enforcer pattern, reality checks in
Authentication Enforcer pattern, related patterns      
Authentication Enforcer pattern, related patterns, Container Managed Security
Authentication Enforcer pattern, related patterns, Secure Base Action      
Authentication Enforcer pattern, sample code
Authentication Enforcer pattern, security factors and risk in
Authentication Enforcer pattern, solution      
Authentication Enforcer pattern, strategies in
Authentication Enforcer pattern, structure
Authentication in security patterns
Authentication in security patterns, Assertion Builder      2nd
Authentication in security patterns, Authentication Enforcer      [See Authentication Enforcer pattern]
Authentication in security patterns, Business tier      
Authentication in security patterns, Dynamic Service Management      
Authentication in security patterns, Intercepting Web Agent      
Authentication in security patterns, Password Synchronizer      
Authentication in security patterns, Policy Delegate      
Authentication in security patterns, Secure Base Action      
Authentication in security patterns, Secure Service Facade
Authentication in security patterns, Secure Session Object
Authentication in security patterns, Web tier
Authentication in trust model      
Authentication provider-based strategy
Authentication provider-based strategy, Authentication Enforcer pattern
Authentication provider-based strategy, JAAS Login Module
Authentication Request protocol
Authentication, assessment checklists
Authentication, biometrics      2nd 3rd 4th
Authentication, broken      2nd 3rd
Authentication, in case study      
Authentication, J2EE      2nd
Authentication, J2EE, agent-based      2nd
Authentication, J2EE, application-based      
Authentication, J2EE, container-based      
Authentication, J2EE, declarative
Authentication, J2EE, programmatic
Authentication, J2EE, Web tier
Authentication, JAAS      
Authentication, JAAS, classes for      
Authentication, JAAS, in clients
Authentication, JAAS, LoginModule for      2nd
Authentication, JAAS, web-tier      
Authentication, Java code      
Authentication, JMS      
Authentication, JSSE
Authentication, Liberty Alliance sessions
Authentication, multi-factor
Authentication, personal identification      
Authentication, SAML      2nd
Authentication, SAML, assertions in      2nd 3rd
Authentication, SAML, third-party      
Authentication, Security services      
Authentication, Security Wheel      
Authentication, smart cards      2nd 3rd
Authentication, Web services      
AuthenticationEnforcer class
AuthenticationInstant class      
AuthenticationProvider class      
AuthenticationStatement class      
Authoritative Source of Data pattern      
Authorization      
Authorization and Access Control service      
Authorization Enforcer pattern      
Authorization Enforcer pattern, consequences
Authorization Enforcer pattern, forces
Authorization Enforcer pattern, participants and responsibilities      
Authorization Enforcer pattern, problem      
Authorization Enforcer pattern, reality check      
Authorization Enforcer pattern, related patterns
Authorization Enforcer pattern, security factors and risks      
Authorization Enforcer pattern, solution
Authorization Enforcer pattern, strategies      
Authorization Enforcer pattern, structure
Authorization in security patterns      
Authorization in security patterns, Dynamic Service Management
Authorization in security patterns, Intercepting Web Agent
Authorization in security patterns, Policy Delegate      
Authorization in security patterns, Secure Base Action
Authorization in security patterns, Secure Session Object      
Authorization providers
Authorization, classes for
authorization, J2EE      2nd 3rd
Authorization, J2EE, declarative
Authorization, J2EE, programmatic      
Authorization, J2EE, Web tier
Authorization, JAAS
Authorization, JAAS, implementing
Authorization, JAAS, strategy
authorization, SAML      2nd 3rd
Authorization, Security services      
Authorization, Security Wheel
Authorization, trust model
Authorization, Web services
Authorization, XACML 2.0
AuthorizationEnforcer class
AuthPermission class
Automated back-out strategy      
Automated password retry
Availability
Availability, identity management patterns      
Availability, in case study
Availability, in use cases
Availability, J2EE network topology
Availability, Message Interceptor Gateway pattern
Availability, Secure Message Router pattern      
Availability, security provisioning patterns      
Availability, Security Wheel      
Availability, Web services
B2B (Business-to-Business) applications
B2B (Business-to-Business) applications, identity management in
B2B (Business-to-Business) applications, Liberty Alliance transaction support in
Back-out password strategy      
Basic authentication      
Basic authentication in web.xml
Basic authentication, J2EE      2nd
Basic Information
Basic Profile
Basics of security
Basics of security, cryptography      [See Encryption and cryptography]
Basics of security, identity management      
Basics of security, LDAP      [See LDAP (Lightweight Directory Access Protocol)]
Basics of security, references
Basics of security, requirements and goals
Basics of security, summary
Basics of security, threat modeling      
beginHandshake method
Bertillon, Alphonse
Best practices
Best practices, Business tier patterns      
Best practices, Business tier patterns, architecture
Best practices, Business tier patterns, infrastructure
Best practices, Business tier patterns, policy
Best practices, Identity management patterns
Best practices, personal identification      
Best practices, personal identification, biometrics
Best practices, personal identification, smart cards
Best practices, security provisioning patterns
Best practices, security provisioning patterns, application design
Best practices, security provisioning patterns, quality of service
Best practices, security provisioning patterns, risk mitigation
Best practices, security provisioning patterns, server sizing
Best practices, Web services patterns
Best practices, Web services patterns, communication and message security      
Best practices, Web services patterns, infrastructure
Best practices, Web services patterns, testing and deployment
Best practices, Web tier patterns
Best practices, Web tier patterns, applications
Best practices, Web tier patterns, communication
Best practices, Web tier patterns, infrastructure
Binary security tokens
BinaryToken class
BIND requests
BioAPI standard      2nd
Biometric identification and authentication      2nd 3rd
Biometric identification and authentication, accuracy      
Biometric identification and authentication, architecture and implementation
Biometric identification and authentication, best practices
Biometric identification and authentication, in multi-factor authentication
Biometric identification and authentication, operational models      
Biometric identification and authentication, SSO strategy
Biometric identification and authentication, verification process
Biometric service providers (BSPs)
black box testing
Black box testing in case study
Black box testing, Secure UP      2nd 3rd
Blanket MIDlets
Block ciphers
Block encryption algorithms
Bodies in SOAP messages
Broken access control risk
Broken authentication
Broken authentication, Assertion Builder pattern
Broken authentication, Password Synchronizer pattern
Browser plug-ins
Browser plug-ins for biometrics
Browser plug-ins for smart cards
brute force attacks
BSPs (biometric service providers)
Buffer overflow
Build portion in patterns-driven security design
Build vs. buy decisions
Build vs. buy decisions, Assertion Builder pattern
Build vs. buy decisions, Business tier pattern
Build vs. buy decisions, Intercepting Web Agent pattern      
Build vs. buy decisions, Password Synchronizer pattern      
Built-in Java security model
Business and business challenges
Business and business challenges, in case study
Business and business challenges, processing logic
Business and business challenges, service provisioning
Business and business challenges, tasks auditing
Business Delegate pattern      
Business Delegate pattern and Delegate pattern      
Business Delegate pattern and Single Sign-on Delegator pattern      
Business Delegate pattern and Synchronizer pattern      
Business tier
Business tier in case study      2nd 3rd
Business tier in J2EE      [See EJB tier in J2EE]
Business tier, reality checks for
Business tier, security patterns      2nd
Business tier, security patterns, Audit Interceptor
Business tier, security patterns, best practices      
Business tier, security patterns, Container Managed Security      
Business tier, security patterns, Dynamic Service Management      
Business tier, security patterns, factor analysis
Business tier, security patterns, Obfuscated Transfer Object      
Business tier, security patterns, overview      2nd
Business tier, security patterns, pitfalls
Business tier, security patterns, Policy Delegate
Business tier, security patterns, references
Business tier, security patterns, Secure Service Facade      
Business tier, security patterns, Secure Session Object
Business-to-Business (B2B) applications      
Business-to-Business (B2B) applications, identity management in
Business-to-Business (B2B) applications, Liberty Alliance transaction support in      
Bytecode verifiers
CA (connector architecture)      
CA SiteMinder WebAgent      
Caching in Single Sign-on Delegator pattern      
CADs (card acceptance devices)      
Caesar ciphers
California, notice of security breach requirements
CallbackHandler class      2nd 3rd 4th 5th
Callbacks in J2EE      
Canadian Public Accounting Board      
Canonical transformations      
Canonicalization algorithms      2nd
CAP (Converted Applet) files      
Capacitance-based scanners
Capstone project      
Card acceptance devices (CADs)      2nd
Card Unique Identifiers (CUIDs)      
Cards, smart cards      [See Smart cards]
CAs (Certificates of Authority)      
CAs (Certificates of Authority), CertPath      
CAs (Certificates of Authority), for certificates      
CAs (Certificates of Authority), for certificates, issuing      
CAs (Certificates of Authority), for certificates, revoking      
CAs (Certificates of Authority), for signed applets      
CAs (Certificates of Authority), J2EE
Case study      
Case study, architecture      2nd 3rd
Case study, assumptions      
Case study, challenges      
Case study, conceptual security model      
Case study, conclusion
Case study, deployment
Case study, design      
Case study, design, Business tier      2nd
Case study, design, classes in
Case study, design, data modeling and objects      
Case study, design, factor analysis      
Case study, design, Identity tier      
Case study, design, infrastructure      
Case study, design, policy      
Case study, design, security patterns      
Case study, design, services in
Case study, design, threat profiling      
Case study, design, tier analysis      
Case study, design, trust model      
Case study, design, Web Services tier      2nd
Case study, design, Web tier      2nd
Case study, development      
Case study, lessons learned      
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2025
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте