Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Audit Interceptor pattern, in case study      2nd 3rd 4th
Audit Interceptor pattern, participants and responsibilities      
Audit Interceptor pattern, problem      
Audit Interceptor pattern, reality check      
Audit Interceptor pattern, related patterns      
Audit Interceptor pattern, sample code      
Audit Interceptor pattern, security factors and risks      
Audit Interceptor pattern, solution      
Audit Interceptor pattern, strategies      
Audit Interceptor pattern, structure      
audit method      
AuditClient.java file      
Auditing      
Auditing, Assertion Builder pattern      
Auditing, Audit Interceptor pattern      [See Audit Interceptor pattern]
Auditing, biometrics      
Auditing, Business tier patterns      2nd 3rd
Auditing, Dynamic Service Management pattern      
Auditing, failures in      
Auditing, identity management      2nd 3rd
Auditing, Secure Service Facade pattern      
Auditing, Secure UP      2nd
Auditing, Security Wheel      
Auditing, Single Sign-on Delegator pattern      
Auditing, Web services      2nd
Auditing, Web tier patterns      2nd
AuditLog class      2nd
AuditLogJdbcDAO class      
AuditRequestMessageBean.java file      
Authentication      
Authentication Enforcer pattern      
Authentication Enforcer pattern, consequences      
Authentication Enforcer pattern, forces      
Authentication Enforcer pattern, in case study      2nd 3rd 4th 5th
Authentication Enforcer pattern, participants and responsibilities      
Authentication Enforcer pattern, problem      
Authentication Enforcer pattern, reality checks in      
Authentication Enforcer pattern, related patterns      
Authentication Enforcer pattern, related patterns, Container Managed Security      
Authentication Enforcer pattern, related patterns, Secure Base Action      
Authentication Enforcer pattern, sample code      
Authentication Enforcer pattern, security factors and risk in      
Authentication Enforcer pattern, solution      
Authentication Enforcer pattern, strategies in      
Authentication Enforcer pattern, structure      
Authentication in security patterns      
Authentication in security patterns, Assertion Builder      2nd
Authentication in security patterns, Authentication Enforcer      [See Authentication Enforcer pattern]
Authentication in security patterns, Business tier      
Authentication in security patterns, Dynamic Service Management      
Authentication in security patterns, Intercepting Web Agent      
Authentication in security patterns, Password Synchronizer      
Authentication in security patterns, Policy Delegate      
Authentication in security patterns, Secure Base Action
Authentication in security patterns, Secure Service Facade      
Authentication in security patterns, Secure Session Object      
Authentication in security patterns, Web tier      
Authentication in trust model      
Authentication provider-based strategy
Authentication provider-based strategy, Authentication Enforcer pattern      
Authentication provider-based strategy, JAAS Login Module      
Authentication Request protocol
Authentication, assessment checklists
Authentication, biometrics      2nd 3rd 4th
Authentication, broken      2nd 3rd
Authentication, in case study      
Authentication, J2EE      2nd
Authentication, J2EE, agent-based      2nd
Authentication, J2EE, application-based      
Authentication, J2EE, container-based      
Authentication, J2EE, declarative      
Authentication, J2EE, programmatic
Authentication, J2EE, Web tier
Authentication, JAAS
Authentication, JAAS, classes for      
Authentication, JAAS, in clients      
Authentication, JAAS, LoginModule for      2nd
Authentication, JAAS, web-tier      
Authentication, Java code
Authentication, JMS      
Authentication, JSSE      
Authentication, Liberty Alliance sessions      
Authentication, multi-factor
Authentication, personal identification      
Authentication, SAML      2nd
Authentication, SAML, assertions in      2nd 3rd
Authentication, SAML, third-party      
Authentication, Security services      
Authentication, Security Wheel      
Authentication, smart cards      2nd 3rd
Authentication, Web services      
AuthenticationEnforcer class
AuthenticationInstant class
AuthenticationProvider class
AuthenticationStatement class
Authoritative Source of Data pattern      
Authorization      
Authorization and Access Control service
Authorization Enforcer pattern      
Authorization Enforcer pattern, consequences      
Authorization Enforcer pattern, forces
Authorization Enforcer pattern, participants and responsibilities      
Authorization Enforcer pattern, problem      
Authorization Enforcer pattern, reality check
Authorization Enforcer pattern, related patterns
Authorization Enforcer pattern, security factors and risks
Authorization Enforcer pattern, solution
Authorization Enforcer pattern, strategies      
Authorization Enforcer pattern, structure      
Authorization in security patterns
Authorization in security patterns, Dynamic Service Management      
Authorization in security patterns, Intercepting Web Agent      
Authorization in security patterns, Policy Delegate      
Authorization in security patterns, Secure Base Action      
Authorization in security patterns, Secure Session Object      
Authorization providers
Authorization, classes for
authorization, J2EE      2nd 3rd
Authorization, J2EE, declarative      
Authorization, J2EE, programmatic      
Authorization, J2EE, Web tier      
Authorization, JAAS
Authorization, JAAS, implementing      
Authorization, JAAS, strategy
authorization, SAML      2nd 3rd
Authorization, Security services
Authorization, Security Wheel      
Authorization, trust model      
Authorization, Web services
Authorization, XACML 2.0
AuthorizationEnforcer class
AuthPermission class      
Automated back-out strategy
Automated password retry      
Availability      
Availability, identity management patterns      
Availability, in case study      
Availability, in use cases      
Availability, J2EE network topology      
Availability, Message Interceptor Gateway pattern      
Availability, Secure Message Router pattern      
Availability, security provisioning patterns      
Availability, Security Wheel      
Availability, Web services      
B2B (Business-to-Business) applications      
B2B (Business-to-Business) applications, identity management in      
B2B (Business-to-Business) applications, Liberty Alliance transaction support in      
Back-out password strategy
Basic authentication      
Basic authentication in web.xml      
Basic authentication, J2EE      2nd
Basic Information
Basic Profile
Basics of security
Basics of security, cryptography      [See Encryption and cryptography]
Basics of security, identity management      
Basics of security, LDAP      [See LDAP (Lightweight Directory Access Protocol)]
Basics of security, references      
Basics of security, requirements and goals      
Basics of security, summary
Basics of security, threat modeling      
beginHandshake method      
Bertillon, Alphonse      
Best practices      
Best practices, Business tier patterns      
Best practices, Business tier patterns, architecture      
Best practices, Business tier patterns, infrastructure
Best practices, Business tier patterns, policy
Best practices, Identity management patterns      
Best practices, personal identification      
Best practices, personal identification, biometrics      
Best practices, personal identification, smart cards      
Best practices, security provisioning patterns      
Best practices, security provisioning patterns, application design      
Best practices, security provisioning patterns, quality of service      
Best practices, security provisioning patterns, risk mitigation      
Best practices, security provisioning patterns, server sizing
Best practices, Web services patterns
Best practices, Web services patterns, communication and message security      
Best practices, Web services patterns, infrastructure      
Best practices, Web services patterns, testing and deployment      
Best practices, Web tier patterns
Best practices, Web tier patterns, applications
Best practices, Web tier patterns, communication      
Best practices, Web tier patterns, infrastructure      
Binary security tokens
BinaryToken class
BIND requests      
BioAPI standard      2nd
Biometric identification and authentication      2nd 3rd
Biometric identification and authentication, accuracy      
Biometric identification and authentication, architecture and implementation      
Biometric identification and authentication, best practices      
Biometric identification and authentication, in multi-factor authentication
Biometric identification and authentication, operational models
Biometric identification and authentication, SSO strategy      
Biometric identification and authentication, verification process      
Biometric service providers (BSPs)      
black box testing      
Black box testing in case study      
Black box testing, Secure UP      2nd 3rd
Blanket MIDlets      
Block ciphers      
Block encryption algorithms      
Bodies in SOAP messages      
Broken access control risk      
Broken authentication      
Broken authentication, Assertion Builder pattern      
Broken authentication, Password Synchronizer pattern
Browser plug-ins
Browser plug-ins for biometrics
Browser plug-ins for smart cards      
brute force attacks      
BSPs (biometric service providers)      
Buffer overflow      
Build portion in patterns-driven security design      
Build vs. buy decisions
Build vs. buy decisions, Assertion Builder pattern
Build vs. buy decisions, Business tier pattern
Build vs. buy decisions, Intercepting Web Agent pattern      
Build vs. buy decisions, Password Synchronizer pattern      
Built-in Java security model      
Business and business challenges
Business and business challenges, in case study
Business and business challenges, processing logic      
Business and business challenges, service provisioning      
Business and business challenges, tasks auditing      
Business Delegate pattern      
Business Delegate pattern and Delegate pattern
Business Delegate pattern and Single Sign-on Delegator pattern      
Business Delegate pattern and Synchronizer pattern      
Business tier      
Business tier in case study      2nd 3rd
Business tier in J2EE      [See EJB tier in J2EE]
Business tier, reality checks for      
Business tier, security patterns      2nd
Business tier, security patterns, Audit Interceptor
Business tier, security patterns, best practices      
Business tier, security patterns, Container Managed Security
Business tier, security patterns, Dynamic Service Management
Business tier, security patterns, factor analysis      
Business tier, security patterns, Obfuscated Transfer Object      
Business tier, security patterns, overview      2nd
Business tier, security patterns, pitfalls
Business tier, security patterns, Policy Delegate
Business tier, security patterns, references
Business tier, security patterns, Secure Service Facade
Business tier, security patterns, Secure Session Object      
Business-to-Business (B2B) applications
Business-to-Business (B2B) applications, identity management in      
Business-to-Business (B2B) applications, Liberty Alliance transaction support in      
Bytecode verifiers      
CA (connector architecture)      
CA SiteMinder WebAgent      
Caching in Single Sign-on Delegator pattern
CADs (card acceptance devices)
Caesar ciphers
California, notice of security breach requirements
CallbackHandler class      2nd 3rd 4th 5th
Callbacks in J2EE
Canadian Public Accounting Board
Canonical transformations      
Canonicalization algorithms      2nd
CAP (Converted Applet) files
Capacitance-based scanners
Capstone project
Card acceptance devices (CADs)      2nd
Card Unique Identifiers (CUIDs)
Cards, smart cards      [See Smart cards]
CAs (Certificates of Authority)
CAs (Certificates of Authority), CertPath      
CAs (Certificates of Authority), for certificates
CAs (Certificates of Authority), for certificates, issuing
CAs (Certificates of Authority), for certificates, revoking      
CAs (Certificates of Authority), for signed applets
CAs (Certificates of Authority), J2EE      
Case study
Case study, architecture      2nd 3rd
Case study, assumptions
Case study, challenges
Case study, conceptual security model
Case study, conclusion
Case study, deployment
Case study, design      
Case study, design, Business tier      2nd
Case study, design, classes in      
Case study, design, data modeling and objects      
Case study, design, factor analysis      
Case study, design, Identity tier
Case study, design, infrastructure      
Case study, design, policy
Case study, design, security patterns
Case study, design, services in      
Case study, design, threat profiling      
Case study, design, tier analysis
Case study, design, trust model
Case study, design, Web Services tier      2nd
Case study, design, Web tier      2nd
Case study, development      
Case study, lessons learned
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2026
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте