Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Encryption and cryptography, signatures in      [See Signatures]
Encryption and cryptography, SSL in
Encryption and cryptography, symmetric ciphers      
Encryption and cryptography, TLS in      
Encryption and cryptography, weak      
Encryption and cryptography, Web services patterns      2nd 3rd
Encryption and cryptography, Web tier patterns      
Encryption and cryptography, WS-Security      2nd
Encryption and cryptography, XML      [See XML (Extensible Markup Language)]
EncryptionHelper class
Encryptor class
End-to-end transport layer security
Endpoints in case study
Engine classes
Engine classes, JCA      
Engine classes, JCE
Enhanced Client and Proxy (ECP) profile      
Enrollment systems      
Enrollment systems, biometrics      2nd
Enrollment systems, smart card      2nd
Enterprise Java Beans (EJBs)
Enterprise Java Beans (EJBs), Container Managed Security pattern
Enterprise Java Beans (EJBs), declarative security for      
Enterprise Java Beans (EJBs), for programmatic security      
Enterprise Java Beans (EJBs), helper classes in
Enterprise Java Beans (EJBs), in case study      
Enterprise Privacy Authorization Language (EPAL)
Enterprise-information system (EIS) tier      2nd
Enterprise-information system (EIS) tier, connector architecture in
Enterprise-information system (EIS) tier, JDBC in      
Enterprise-information system (EIS) tier, JMS in      
EnterpriseService class
Entitlement in Web services
Entity management
Enveloped Signature transform algorithms      
Enveloped signatures
Envelopes in SOAP messages
Enveloping signatures
Enveloping signatures, examples      
Enveloping signatures, XML
Environment setup in Secure UP
EPAL (Enterprise Privacy Authorization Language)
EPCGlobal standards
EPCs (Electronic Product Codes)
Equal Error Rate (EER) probability
ERewards Membership Service      [See Case study]
Errors and error handling      
Errors and error handling, improper
Errors and error handling, reporting
Errors and error handling, SPML
Errors and error handling, translation      
European Union (EU) Data Protection Directive
EventCatalog class
Exclusive canonicalization encryption
execute method      
execute method, Policy Delegate pattern
execute method, PolicyDelegateInterface
execute method, Secure Base Action pattern
execute method, SecureSessionFacadeSessionBean      
executeAsPrivileged method      
expertise      
Expertise, Message Interceptor Gateway pattern
Expertise, problems in      
Exporting      
Exporting, keystore certificates      
Exporting, policies for
Exposure risk factor
Extended SPML operations
extensibility      
Extensibility, Message Inspector pattern      
Extensibility, Message Interceptor Gateway pattern      
Extensibility, Secure Logger pattern
Extensibility, Secure Message Router pattern      
Extensibility, SPML      
Extensibility, user account provisioning      2nd
Extensible Access Control Markup Language      [See XACML (Extensible Access Control Markup Language)]
Extensible Markup Language      [See XML (Extensible Markup Language)]
Extensible Rights Markup Language (XrML)
External policy server strategy
Extract Adapter pattern      
Facial recognition      
Factor analysis      
Factor analysis for security patterns
Factor analysis in case study
Factory pattern
failover
Failover, J2EE network topology
Failover, service      
Failure to Enroll (FTE) probability
False Acceptance Rate (FAR) probability      2nd
False Match Rate (FMR) probability
False Non-Match Rate (FNMR) probability
False Reject Rate (FRR) probability      2nd
FAR (False Acceptance Rate) probability      2nd
Fault handling
Fault tolerance      
Fault tolerance, J2EE network topology
Fault tolerance, Message Interceptor Gateway pattern
Fault tolerance, Secure Message Router pattern      
Fault tolerance, Web services patterns
FBI survey
Federal regulations      2nd
Federal Trade Commission survey      
Federated affiliates      
Federated data exchange      
Federated identity      2nd
Federated SSO      2nd
Federation management in Liberty Alliance      
Federation services
Federation termination protocol
Federations, cross-domain
fileChanged method
Final classes in Java
Financial losses      
Financial losses, from confidentiality breaches
Financial losses, reported
Financial Privacy Rule
Financial Services Modernization Act
findApplicationId method
Fine-grained security
Fingerprint matching
Fingerprint matching, approaches to
Fingerprint matching, logical architecture
Fingerprints, key
Finished messages
Firewalls      
Firewalls for Java Card applets      
Firewalls, DMZs for
Firewalls, Secure Service Proxy pattern
Firewalls, Web services patterns
Firewalls, Web tier patterns
Firewalls, XML      2nd
Flag values in JAAS      2nd
Flexibility in security patterns
Flexibility in security patterns, Intercepting Web Agent
Flexibility in security patterns, Secure Base Action      
Flexibility in security patterns, Secure Service Proxy
Flexibility in security patterns, Single Sign-on Delegator
FMR (False Match Rate) probability      
FNMR (False Non-Match Rate) probability      
Forces in security pattern templates
Forces in security pattern templates, Assertion Builder      
Forces in security pattern templates, Audit Interceptor
Forces in security pattern templates, Authentication Enforcer
Forces in security pattern templates, Authorization Enforcer
Forces in security pattern templates, Container Managed Security      
Forces in security pattern templates, Credential Tokenizer
Forces in security pattern templates, Dynamic Service Management
Forces in security pattern templates, Intercepting Validator
Forces in security pattern templates, Intercepting Web Agent
Forces in security pattern templates, Message Inspector
Forces in security pattern templates, Message Interceptor Gateway      
Forces in security pattern templates, Obfuscated Transfer Object
Forces in security pattern templates, Password Synchronizer
Forces in security pattern templates, Policy Delegate
Forces in security pattern templates, Secure Base Action
Forces in security pattern templates, Secure Logger      
Forces in security pattern templates, Secure Message Router      
Forces in security pattern templates, Secure Pipe      
Forces in security pattern templates, Secure Service Facade
Forces in security pattern templates, Secure Service Proxy
Forces in security pattern templates, Secure Session Object
Forces in security pattern templates, Single Sign-on Delegator
Form validation
Form validation in XML using Apache Struts
Form validation, Web tier patterns
Form-based authentication
Form-based authentication in web.xml
Form-based authentication, J2EE      2nd
Form-POST-based redirection
Foundstone Enterprise testing tool
Fowler, Martin      
Frameworks, security
Frameworks, security in Secure Service Facade pattern
Frameworks, security, adopting
Front Controller pattern      2nd 3rd
FRR (False Reject Rate) probability      2nd
FTE (Failure to Enroll) probability
Full View with Errors pattern
Gambling casino
Gang of Four (GoF) design patterns
Gartner Group report      
gateways
Gateways, Message Interceptor Gateway pattern      [See Message Interceptor Gateway pattern]
Gateways, Parlay
generateKey method      
Generic products, XACML for
genKeyPair method
genPrivate method
genPublic method
getAction method
getAlgorithm method
getAllConfigContext method
getApplicationBufferSize method
getAssertionReply method
getAuthenticationMethod method      
getCallerPrincipal method      2nd
getCallersIdentity method
getConfigFile method
getConfigProperties method
getConnection method
getContents method
getContext method
getData method
getEncoded method      
getFormat method
getInstance method
getInstance method, Cipher
getInstance method, KeyAgreement
getInstance method, KeyGenerator
getInstance method, KeyPairGenerator      
getInstance method, MBeanFactory      
getInstance method, MBeanManager      
getInstance method, MessageDigest
getInstance method, Signature
getMaxInactiveInterval method      
getPacketBufferSize method      
getPermissions method      
getPrincipal method
getProtectionDomain method
getProtocolBinding method      
getProtocolBinding method, AssertionContextImpl      
getProtocolBinding method, SSOContextImpl      
getProtocolBinding method, TokenContextImpl      
getRegistryFileName method      
getRemoteUser method      2nd
getSecurityInfo method
getSecurityManager method
getServiceName method
getServiceStatus method      
getSession method
getSessionInfo method
getSSODelegator method      
getSSOTokenMap method      
getStatus method      
getSubject method      
getToken method      
getToken method, TokenContextImpl
getToken method, UsernameToken      
getUserPrincipal method      2nd 3rd
GINA (Graphical Identification and Authentication)      
GINA Module      
GINA Module for biometrics      
GINA Module for smart cards      
GLB (Gramm-Leach-Bliley) Act      
Global logout
Global logout in identity management      
Global logout, Liberty Alliance      
Global logout, SAML      
Global Platform technology      
Goals, security
GoF (Gang of Four) design patterns      
Gramm-Leach-Bliley (GLB) Act      
GRANT statement      
Granularity      
Granularity, Container Managed Security pattern
Granularity, Intercepting Web Agent pattern      
Graphical Identification and Authentication (GINA)      
groups      
Groups, identity management
Groups, J2EE      
GSS-API      
HA      [See High availability (HA)]
Hand geometry      
handle method      
handlers      
Handshake messages      
Hardening      
Hardening in Web services patterns      
Hardening in Web tier security      
Hardware acceleration      
Hardware cryptographic devices      
Hardware cryptographic devices, Web services patterns
Hardware cryptographic devices, Web tier patterns      
Headers in SOAP messages
Health Insurance Privacy and Portability Act (HIPPA) of 1996
helper classes      
Helper classes, AuditInterceptor      
Helper classes, EJB
Hierarchical resource profiles
High availability (HA)
High availability (HA) in case study      
High availability (HA) in use cases      
High availability (HA), Identity management patterns      
High availability (HA), J2EE network topology      
High availability (HA), Message Interceptor Gateway pattern
High availability (HA), Secure Message Router pattern
HIPPA (Health Insurance Privacy and Portability Act) of 1996
HMAC-MD5 algorithm
honeypots
Horizontal scaling      
Horizontal scaling, Business tier patterns      
Horizontal scaling, J2EE network topology      
Host operating systems
Host security      
Host security in case study      
Host security in Web services patterns      
Host security, using JSSE      
HostnameVerifier class      
Hot Standby pattern      
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2025
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте