Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Case study, overview      
Case study, pitfalls      
Case study, references      
Case study, risk analysis and mitigation      
Case study, security patterns      2nd
Case study, summary      
Case study, trade-off analysis      
Case study, use cases      [See Use cases]
Caslon Analytics Privacy Guide      
Catalog service      2nd
Catalogs, security pattern      
CBEFF (Common Biometric Exchange File Format)      
CDC (Connected Device Configuration)      
CDSSO (cross-domain SSO)      
CDSSO (cross-domain SSO) in identity management      
CDSSO (cross-domain SSO) in Liberty Alliance      
Centralization      
Centralization, auditing      
Centralization, authentication      
Centralization, Authorization Enforcer pattern      
Centralization, encryption      
Centralization, logging      2nd
Centralization, Message Interceptor Gateway pattern      
Centralization, policies      2nd
Centralization, routing      
Centralization, transaction management      
Centralization, validations      
Centralization, Web services patterns      
Centralized model in user account provisioning      
CER (Crossover Error Rate) probability      
certificate revocation lists (CRLs)      
Certificate Signing Requests (CSRs)      2nd
CertificateFactory class      2nd
Certificates and certificate keys      2nd
Certificates and certificate keys, CA role      
Certificates and certificate keys, certificate chains      
Certificates and certificate keys, for applets      
Certificates and certificate keys, for JAD files      
Certificates and certificate keys, for keytool      
Certificates and certificate keys, for SSL      
Certificates and certificate keys, importing      2nd
Certificates and certificate keys, in JSSE mutual authentication      
Certificates and certificate keys, PKI      
Certificates and certificate keys, printing      
Certificates and certificate keys, revocation      2nd
Certificates and certificate keys, Secure Pipe pattern      
Certificates and certificate keys, security pattern factor analysis      
Certificates and certificate keys, tokens      2nd
Certificates and certificate keys, Web tier patterns      
Certificates of Authority (CAs)      
Certificates of Authority (CAs) for certificates      
Certificates of Authority (CAs) for certificates, issuing      
Certificates of Authority (CAs) for certificates, revoking      
Certificates of Authority (CAs) for signed applets      
Certificates of Authority (CAs), CertPath      
Certificates of Authority (CAs), J2EE      
CertPath      
CertPath for certificate chains      
CertPath, classes and interfaces in      
CertPathBuilder class      
CertPathValidator class      
CertStore class      
CGI in Web tier patterns      
Challenge-response protocol authentication      
Change management request (CMR) system      
ChangeCipherSpec messages      2nd
Check Point patterns      
checkPermission method      
checkRead method      
Child nodes in attack trees      
Children's Online Privacy Protection Act (COPPA)      
CIM (Common Information Model)      
Cipher class      
Cipher class in JCE      2nd
Cipher class in Secure Logger pattern      
CipherInputStream class      
CipherOutputStream class      
ciphers      
Ciphers, asymmetric      
Ciphers, JCE      
Ciphers, JCE, block      
Ciphers, JCE, stream      
Ciphers, symmetric      
CipherState messages      
Circles of trust      
Circles of trust in Liberty specifications      
Circles of trust in Single Sign-on Delegator pattern      
Claims in WS-Security      
Class diagrams for security patterns      
Class diagrams for security patterns, Assertion Builder      
Class diagrams for security patterns, Audit Interceptor      
Class diagrams for security patterns, Authentication Enforcer      
Class diagrams for security patterns, Authorization Enforcer      
Class diagrams for security patterns, Container Managed Security      
Class diagrams for security patterns, Credential Tokenizer      
Class diagrams for security patterns, Dynamic Service Management      
Class diagrams for security patterns, Intercepting Validator      
Class diagrams for security patterns, Intercepting Web Agent      
Class diagrams for security patterns, JAAS Login Module strategy      
Class diagrams for security patterns, MBean strategy      
Class diagrams for security patterns, Message Inspector      
Class diagrams for security patterns, Message Interceptor Gateway      
Class diagrams for security patterns, Obfuscated Transfer Object      
Class diagrams for security patterns, Password Synchronizer      
Class diagrams for security patterns, Policy Delegate      
Class diagrams for security patterns, Secure Base Action      
Class diagrams for security patterns, Secure Logger      
Class diagrams for security patterns, Secure Message Router      
Class diagrams for security patterns, Secure Pipe      
Class diagrams for security patterns, Secure Service Facade      
Class diagrams for security patterns, Secure Service Proxy      
Class diagrams for security patterns, Secure Session Object      
Class diagrams for security patterns, Single Sign-on Delegator      
Classes      
Classes in case study      
Classes, CertPath      
Classes, JAAS      
classes, Java      
Classes, JCA      
Classes, JCE      
Classes, JSSE      
Classification of security patterns      
ClassLoader      
CLDC (Connected Limited Device Configuration)      
Client Device tier, reality checks for      
Client-certificate authentication      
Client-certificate authentication in web.xml      
Client-certificate authentication, Authentication Enforcer pattern      
Client-certificate authentication, J2EE      
ClientHello messages      
ClientKeyExchange messages      
Clients      
Clients in case study      
Clients in security patterns      
Clients in security patterns, Assertion Builder      
Clients in security patterns, Audit Interceptor      
Clients in security patterns, Authentication Enforcer      
Clients in security patterns, Container Managed Security      
Clients in security patterns, Credential Tokenizer      
Clients in security patterns, Intercepting Validator      
Clients in security patterns, Intercepting Web Agent      
Clients in security patterns, Message Inspector      
Clients in security patterns, Message Interceptor Gateway      
Clients in security patterns, Obfuscated Transfer Object      
Clients in security patterns, Password Synchronizer      
Clients in security patterns, Policy Delegate      2nd
Clients in security patterns, Secure Base Action      
Clients in security patterns, Secure Logger      
Clients in security patterns, Secure Message Router      
Clients in security patterns, Secure Pipe      
Clients in security patterns, Secure Service Proxy      
Clients in security patterns, Secure Session Object      
Clients in security patterns, Single Sign-on Delegator      2nd
Clients, Identity Provider Agent strategy      
Clients, J2EE      2nd 3rd
Clients, JAAS authentication for      
Clients, JSSE      
Clients, Liberty specifications      
Clients, SAML      
Clients, SASL      2nd
Clients, server connections      2nd
Clients, use cases      
closeService method      2nd
closeSSOConnection method      
Clustered PEP pattern      
CMR (change management request) system      
code, Java      
code, Java, obfuscation      
code, Java, reverse engineering      
Codebase in Java 2      
CodeSource in Java 2      
Coding problems      
Cold Standby pattern      
Collisions in one-way hash functions      
Command APDUs      
commit method      
commit method, LoginModule      
commit method, SAML      
commitTransactions method      
Common Biometric Exchange File Format (CBEFF)      
Common classes in JAAS      
Common Information Model (CIM)      
Common Open Policy Service (COPS)      
Common SAML functions      
Communication      
Communication, biometrics      
Communication, JGSS      
Communication, Liberty Alliance      
Communication, Web services      2nd
Communication, Web tier patterns      
Compact Virtual Machine (CVM)      
Comparator-checked Fault Tolerant System pattern      
Compatibility      
Compatibility in proprietary systems      
Compatibility in Secure Pipe pattern      
Compiling applets      
complexity      
Complexity, Assertion Builder pattern      
Complexity, Authorization Enforcer pattern      
Complexity, personal identification systems      
Complexity, Policy Delegate pattern      2nd
Complexity, Secure Pipe pattern      
Compliance      
Compliance in other countries      
Compliance in Security Wheel      
Compliance in Web services patterns      
Compliance, COPPA      
Compliance, Data Protection Directive      
Compliance, Gramm-Leach-Bliley Act      
Compliance, HIPPA      
Compliance, justifications      
Compliance, Notice of Security Breach      
Compliance, Sarbanes-Oxley Act      
Component security      
Component security, Business tier patterns      
Component security, J2EE      
Component security, J2EE, authentication      
Component security, J2EE, authorization      
Component security, J2EE, context propagation      
Component security, J2EE, HTTP session tracking      
Component security, J2EE, users, groups, roles, and realms      
Component security, J2EE, Web tier      
Component-managed sign-on      
Composability issues      
Computer Security Institute survey      
Conceptual security model      
Concurrency      
Concurrency, Message Inspector pattern      
Concurrency, Secure Session Object pattern      
conditions      
Conditions, Parlay      
Conditions, policy design      
Conditions, SAML assertions      
Confidentiality      2nd
Confidentiality in security patterns      
Confidentiality in security patterns, Assertion Builder      
Confidentiality in security patterns, Authentication Enforcer      
Confidentiality in security patterns, Dynamic Service Management      
Confidentiality in security patterns, Message Inspector      
Confidentiality in security patterns, Obfuscated Transfer Object      
Confidentiality in security patterns, Policy Delegate      
Confidentiality in security patterns, Secure Logger      
Confidentiality in security patterns, Secure Pipe      
Confidentiality, breaches      
Confidentiality, Security Wheel      
Confidentiality, Web services      2nd
Configuration      
Configuration class      
Configuration, Assertion Builder pattern      
Configuration, in case study      
Configuration, insecure      
Configuration, J2ME      
Configuration, Web services patterns      
Conformance requirements      
Connected Device Configuration (CDC)      
Connected Limited Device Configuration (CLDC)      
Connections      
Connections in case study      
Connections in use cases      
Connections, client-server      2nd
Connections, SSL      2nd
Connector architecture (CA)      
Connector Factory      
Consequences in security patterns      
Consequences in security patterns, Assertion Builder      
Consequences in security patterns, Audit Interceptor      
Consequences in security patterns, Authentication Enforcer      
Consequences in security patterns, Authorization Enforcer      
Consequences in security patterns, Container Managed Security      
Consequences in security patterns, Credential Tokenizer      
Consequences in security patterns, Dynamic Service Management      
Consequences in security patterns, Intercepting Validator      
Consequences in security patterns, Intercepting Web Agent      
Consequences in security patterns, Message Inspector      
Consequences in security patterns, Message Interceptor Gateway      
Consequences in security patterns, Obfuscated Transfer Object      
Consequences in security patterns, Password Synchronizer      
Consequences in security patterns, Policy Delegate      
Consequences in security patterns, Secure Base Action      
Consequences in security patterns, Secure Logger      2nd
Consequences in security patterns, Secure Message Router      
Consequences in security patterns, Secure Pipe      
Consequences in security patterns, Secure Service Facade      
Consequences in security patterns, Secure Service Proxy      
Consequences in security patterns, Secure Session Object      
Consequences in security patterns, Single Sign-on Delegator      
Constants in Java System Access Manager      
Constraints      
Constraints in use cases      
Constraints, authorization      
Contact cards      
Container authenticated strategy      
Container Managed Security pattern      
Container Managed Security pattern, consequences      
Container Managed Security pattern, forces      
Container Managed Security pattern, participants and responsibilities      
Container Managed Security pattern, problem      
Container Managed Security pattern, reality check      
Container Managed Security pattern, related patterns      
Container Managed Security pattern, sample code      
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте