Авторизация
Поиск по указателям
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Авторы: Steel Ch., Nagappan R., Lai R.
Аннотация: For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.
Язык:
Рубрика: Технология /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 2005
Количество страниц: 1088
Добавлена в каталог: 19.08.2007
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
Audit Interceptor pattern, in case study 2nd 3rd 4th
Audit Interceptor pattern, participants and responsibilities
Audit Interceptor pattern, problem
Audit Interceptor pattern, reality check
Audit Interceptor pattern, related patterns
Audit Interceptor pattern, sample code
Audit Interceptor pattern, security factors and risks
Audit Interceptor pattern, solution
Audit Interceptor pattern, strategies
Audit Interceptor pattern, structure
audit method
AuditClient.java file
Auditing
Auditing, Assertion Builder pattern
Auditing, Audit Interceptor pattern [See Audit Interceptor pattern]
Auditing, biometrics
Auditing, Business tier patterns 2nd 3rd
Auditing, Dynamic Service Management pattern
Auditing, failures in
Auditing, identity management 2nd 3rd
Auditing, Secure Service Facade pattern
Auditing, Secure UP 2nd
Auditing, Security Wheel
Auditing, Single Sign-on Delegator pattern
Auditing, Web services 2nd
Auditing, Web tier patterns 2nd
AuditLog class 2nd
AuditLogJdbcDAO class
AuditRequestMessageBean.java file
Authentication
Authentication Enforcer pattern
Authentication Enforcer pattern, consequences
Authentication Enforcer pattern, forces
Authentication Enforcer pattern, in case study 2nd 3rd 4th 5th
Authentication Enforcer pattern, participants and responsibilities
Authentication Enforcer pattern, problem
Authentication Enforcer pattern, reality checks in
Authentication Enforcer pattern, related patterns
Authentication Enforcer pattern, related patterns, Container Managed Security
Authentication Enforcer pattern, related patterns, Secure Base Action
Authentication Enforcer pattern, sample code
Authentication Enforcer pattern, security factors and risk in
Authentication Enforcer pattern, solution
Authentication Enforcer pattern, strategies in
Authentication Enforcer pattern, structure
Authentication in security patterns
Authentication in security patterns, Assertion Builder 2nd
Authentication in security patterns, Authentication Enforcer [See Authentication Enforcer pattern]
Authentication in security patterns, Business tier
Authentication in security patterns, Dynamic Service Management
Authentication in security patterns, Intercepting Web Agent
Authentication in security patterns, Password Synchronizer
Authentication in security patterns, Policy Delegate
Authentication in security patterns, Secure Base Action
Authentication in security patterns, Secure Service Facade
Authentication in security patterns, Secure Session Object
Authentication in security patterns, Web tier
Authentication in trust model
Authentication provider-based strategy
Authentication provider-based strategy, Authentication Enforcer pattern
Authentication provider-based strategy, JAAS Login Module
Authentication Request protocol
Authentication, assessment checklists
Authentication, biometrics 2nd 3rd 4th
Authentication, broken 2nd 3rd
Authentication, in case study
Authentication, J2EE 2nd
Authentication, J2EE, agent-based 2nd
Authentication, J2EE, application-based
Authentication, J2EE, container-based
Authentication, J2EE, declarative
Authentication, J2EE, programmatic
Authentication, J2EE, Web tier
Authentication, JAAS
Authentication, JAAS, classes for
Authentication, JAAS, in clients
Authentication, JAAS, LoginModule for 2nd
Authentication, JAAS, web-tier
Authentication, Java code
Authentication, JMS
Authentication, JSSE
Authentication, Liberty Alliance sessions
Authentication, multi-factor
Authentication, personal identification
Authentication, SAML 2nd
Authentication, SAML, assertions in 2nd 3rd
Authentication, SAML, third-party
Authentication, Security services
Authentication, Security Wheel
Authentication, smart cards 2nd 3rd
Authentication, Web services
AuthenticationEnforcer class
AuthenticationInstant class
AuthenticationProvider class
AuthenticationStatement class
Authoritative Source of Data pattern
Authorization
Authorization and Access Control service
Authorization Enforcer pattern
Authorization Enforcer pattern, consequences
Authorization Enforcer pattern, forces
Authorization Enforcer pattern, participants and responsibilities
Authorization Enforcer pattern, problem
Authorization Enforcer pattern, reality check
Authorization Enforcer pattern, related patterns
Authorization Enforcer pattern, security factors and risks
Authorization Enforcer pattern, solution
Authorization Enforcer pattern, strategies
Authorization Enforcer pattern, structure
Authorization in security patterns
Authorization in security patterns, Dynamic Service Management
Authorization in security patterns, Intercepting Web Agent
Authorization in security patterns, Policy Delegate
Authorization in security patterns, Secure Base Action
Authorization in security patterns, Secure Session Object
Authorization providers
Authorization, classes for
authorization, J2EE 2nd 3rd
Authorization, J2EE, declarative
Authorization, J2EE, programmatic
Authorization, J2EE, Web tier
Authorization, JAAS
Authorization, JAAS, implementing
Authorization, JAAS, strategy
authorization, SAML 2nd 3rd
Authorization, Security services
Authorization, Security Wheel
Authorization, trust model
Authorization, Web services
Authorization, XACML 2.0
AuthorizationEnforcer class
AuthPermission class
Automated back-out strategy
Automated password retry
Availability
Availability, identity management patterns
Availability, in case study
Availability, in use cases
Availability, J2EE network topology
Availability, Message Interceptor Gateway pattern
Availability, Secure Message Router pattern
Availability, security provisioning patterns
Availability, Security Wheel
Availability, Web services
B2B (Business-to-Business) applications
B2B (Business-to-Business) applications, identity management in
B2B (Business-to-Business) applications, Liberty Alliance transaction support in
Back-out password strategy
Basic authentication
Basic authentication in web.xml
Basic authentication, J2EE 2nd
Basic Information
Basic Profile
Basics of security
Basics of security, cryptography [See Encryption and cryptography]
Basics of security, identity management
Basics of security, LDAP [See LDAP (Lightweight Directory Access Protocol)]
Basics of security, references
Basics of security, requirements and goals
Basics of security, summary
Basics of security, threat modeling
beginHandshake method
Bertillon, Alphonse
Best practices
Best practices, Business tier patterns
Best practices, Business tier patterns, architecture
Best practices, Business tier patterns, infrastructure
Best practices, Business tier patterns, policy
Best practices, Identity management patterns
Best practices, personal identification
Best practices, personal identification, biometrics
Best practices, personal identification, smart cards
Best practices, security provisioning patterns
Best practices, security provisioning patterns, application design
Best practices, security provisioning patterns, quality of service
Best practices, security provisioning patterns, risk mitigation
Best practices, security provisioning patterns, server sizing
Best practices, Web services patterns
Best practices, Web services patterns, communication and message security
Best practices, Web services patterns, infrastructure
Best practices, Web services patterns, testing and deployment
Best practices, Web tier patterns
Best practices, Web tier patterns, applications
Best practices, Web tier patterns, communication
Best practices, Web tier patterns, infrastructure
Binary security tokens
BinaryToken class
BIND requests
BioAPI standard 2nd
Biometric identification and authentication 2nd 3rd
Biometric identification and authentication, accuracy
Biometric identification and authentication, architecture and implementation
Biometric identification and authentication, best practices
Biometric identification and authentication, in multi-factor authentication
Biometric identification and authentication, operational models
Biometric identification and authentication, SSO strategy
Biometric identification and authentication, verification process
Biometric service providers (BSPs)
black box testing
Black box testing in case study
Black box testing, Secure UP 2nd 3rd
Blanket MIDlets
Block ciphers
Block encryption algorithms
Bodies in SOAP messages
Broken access control risk
Broken authentication
Broken authentication, Assertion Builder pattern
Broken authentication, Password Synchronizer pattern
Browser plug-ins
Browser plug-ins for biometrics
Browser plug-ins for smart cards
brute force attacks
BSPs (biometric service providers)
Buffer overflow
Build portion in patterns-driven security design
Build vs. buy decisions
Build vs. buy decisions, Assertion Builder pattern
Build vs. buy decisions, Business tier pattern
Build vs. buy decisions, Intercepting Web Agent pattern
Build vs. buy decisions, Password Synchronizer pattern
Built-in Java security model
Business and business challenges
Business and business challenges, in case study
Business and business challenges, processing logic
Business and business challenges, service provisioning
Business and business challenges, tasks auditing
Business Delegate pattern
Business Delegate pattern and Delegate pattern
Business Delegate pattern and Single Sign-on Delegator pattern
Business Delegate pattern and Synchronizer pattern
Business tier
Business tier in case study 2nd 3rd
Business tier in J2EE [See EJB tier in J2EE]
Business tier, reality checks for
Business tier, security patterns 2nd
Business tier, security patterns, Audit Interceptor
Business tier, security patterns, best practices
Business tier, security patterns, Container Managed Security
Business tier, security patterns, Dynamic Service Management
Business tier, security patterns, factor analysis
Business tier, security patterns, Obfuscated Transfer Object
Business tier, security patterns, overview 2nd
Business tier, security patterns, pitfalls
Business tier, security patterns, Policy Delegate
Business tier, security patterns, references
Business tier, security patterns, Secure Service Facade
Business tier, security patterns, Secure Session Object
Business-to-Business (B2B) applications
Business-to-Business (B2B) applications, identity management in
Business-to-Business (B2B) applications, Liberty Alliance transaction support in
Bytecode verifiers
CA (connector architecture)
CA SiteMinder WebAgent
Caching in Single Sign-on Delegator pattern
CADs (card acceptance devices)
Caesar ciphers
California, notice of security breach requirements
CallbackHandler class 2nd 3rd 4th 5th
Callbacks in J2EE
Canadian Public Accounting Board
Canonical transformations
Canonicalization algorithms 2nd
CAP (Converted Applet) files
Capacitance-based scanners
Capstone project
Card acceptance devices (CADs) 2nd
Card Unique Identifiers (CUIDs)
Cards, smart cards [See Smart cards]
CAs (Certificates of Authority)
CAs (Certificates of Authority), CertPath
CAs (Certificates of Authority), for certificates
CAs (Certificates of Authority), for certificates, issuing
CAs (Certificates of Authority), for certificates, revoking
CAs (Certificates of Authority), for signed applets
CAs (Certificates of Authority), J2EE
Case study
Case study, architecture 2nd 3rd
Case study, assumptions
Case study, challenges
Case study, conceptual security model
Case study, conclusion
Case study, deployment
Case study, design
Case study, design, Business tier 2nd
Case study, design, classes in
Case study, design, data modeling and objects
Case study, design, factor analysis
Case study, design, Identity tier
Case study, design, infrastructure
Case study, design, policy
Case study, design, security patterns
Case study, design, services in
Case study, design, threat profiling
Case study, design, tier analysis
Case study, design, trust model
Case study, design, Web Services tier 2nd
Case study, design, Web tier 2nd
Case study, development
Case study, lessons learned
Реклама