Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Encryption and cryptography, signatures in      [See Signatures]
Encryption and cryptography, SSL in      
Encryption and cryptography, symmetric ciphers      
Encryption and cryptography, TLS in      
Encryption and cryptography, weak      
Encryption and cryptography, Web services patterns      2nd 3rd
Encryption and cryptography, Web tier patterns      
Encryption and cryptography, WS-Security      2nd
Encryption and cryptography, XML      [See XML (Extensible Markup Language)]
EncryptionHelper class      
Encryptor class      
End-to-end transport layer security      
Endpoints in case study      
Engine classes      
Engine classes, JCA      
Engine classes, JCE      
Enhanced Client and Proxy (ECP) profile      
Enrollment systems      
Enrollment systems, biometrics      2nd
Enrollment systems, smart card      2nd
Enterprise Java Beans (EJBs)      
Enterprise Java Beans (EJBs), Container Managed Security pattern      
Enterprise Java Beans (EJBs), declarative security for      
Enterprise Java Beans (EJBs), for programmatic security      
Enterprise Java Beans (EJBs), helper classes in      
Enterprise Java Beans (EJBs), in case study      
Enterprise Privacy Authorization Language (EPAL)      
Enterprise-information system (EIS) tier      2nd
Enterprise-information system (EIS) tier, connector architecture in      
Enterprise-information system (EIS) tier, JDBC in      
Enterprise-information system (EIS) tier, JMS in      
EnterpriseService class      
Entitlement in Web services      
Entity management      
Enveloped Signature transform algorithms      
Enveloped signatures      
Envelopes in SOAP messages      
Enveloping signatures      
Enveloping signatures, examples      
Enveloping signatures, XML      
Environment setup in Secure UP      
EPAL (Enterprise Privacy Authorization Language)      
EPCGlobal standards      
EPCs (Electronic Product Codes)      
Equal Error Rate (EER) probability      
ERewards Membership Service      [See Case study]
Errors and error handling      
Errors and error handling, improper      
Errors and error handling, reporting      
Errors and error handling, SPML      
Errors and error handling, translation      
European Union (EU) Data Protection Directive      
EventCatalog class      
Exclusive canonicalization encryption      
execute method      
execute method, Policy Delegate pattern      
execute method, PolicyDelegateInterface      
execute method, Secure Base Action pattern      
execute method, SecureSessionFacadeSessionBean      
executeAsPrivileged method      
expertise      
Expertise, Message Interceptor Gateway pattern      
Expertise, problems in      
Exporting      
Exporting, keystore certificates      
Exporting, policies for      
Exposure risk factor      
Extended SPML operations      
extensibility      
Extensibility, Message Inspector pattern      
Extensibility, Message Interceptor Gateway pattern      
Extensibility, Secure Logger pattern      
Extensibility, Secure Message Router pattern      
Extensibility, SPML      
Extensibility, user account provisioning      2nd
Extensible Access Control Markup Language      [See XACML (Extensible Access Control Markup Language)]
Extensible Markup Language      [See XML (Extensible Markup Language)]
Extensible Rights Markup Language (XrML)      
External policy server strategy      
Extract Adapter pattern      
Facial recognition      
Factor analysis      
Factor analysis for security patterns      
Factor analysis in case study      
Factory pattern      
failover      
Failover, J2EE network topology      
Failover, service      
Failure to Enroll (FTE) probability      
False Acceptance Rate (FAR) probability      2nd
False Match Rate (FMR) probability      
False Non-Match Rate (FNMR) probability      
False Reject Rate (FRR) probability      2nd
FAR (False Acceptance Rate) probability      2nd
Fault handling      
Fault tolerance      
Fault tolerance, J2EE network topology      
Fault tolerance, Message Interceptor Gateway pattern      
Fault tolerance, Secure Message Router pattern      
Fault tolerance, Web services patterns      
FBI survey      
Federal regulations      2nd
Federal Trade Commission survey      
Federated affiliates      
Federated data exchange      
Federated identity      2nd
Federated SSO      2nd
Federation management in Liberty Alliance      
Federation services      
Federation termination protocol      
Federations, cross-domain      
fileChanged method      
Final classes in Java      
Financial losses      
Financial losses, from confidentiality breaches      
Financial losses, reported      
Financial Privacy Rule      
Financial Services Modernization Act      
findApplicationId method      
Fine-grained security      
Fingerprint matching      
Fingerprint matching, approaches to      
Fingerprint matching, logical architecture      
Fingerprints, key      
Finished messages      
Firewalls      
Firewalls for Java Card applets      
Firewalls, DMZs for      
Firewalls, Secure Service Proxy pattern      
Firewalls, Web services patterns      
Firewalls, Web tier patterns      
Firewalls, XML      2nd
Flag values in JAAS      2nd
Flexibility in security patterns      
Flexibility in security patterns, Intercepting Web Agent      
Flexibility in security patterns, Secure Base Action      
Flexibility in security patterns, Secure Service Proxy      
Flexibility in security patterns, Single Sign-on Delegator      
FMR (False Match Rate) probability      
FNMR (False Non-Match Rate) probability      
Forces in security pattern templates      
Forces in security pattern templates, Assertion Builder      
Forces in security pattern templates, Audit Interceptor      
Forces in security pattern templates, Authentication Enforcer      
Forces in security pattern templates, Authorization Enforcer      
Forces in security pattern templates, Container Managed Security      
Forces in security pattern templates, Credential Tokenizer      
Forces in security pattern templates, Dynamic Service Management      
Forces in security pattern templates, Intercepting Validator      
Forces in security pattern templates, Intercepting Web Agent      
Forces in security pattern templates, Message Inspector      
Forces in security pattern templates, Message Interceptor Gateway      
Forces in security pattern templates, Obfuscated Transfer Object      
Forces in security pattern templates, Password Synchronizer      
Forces in security pattern templates, Policy Delegate      
Forces in security pattern templates, Secure Base Action      
Forces in security pattern templates, Secure Logger      
Forces in security pattern templates, Secure Message Router      
Forces in security pattern templates, Secure Pipe      
Forces in security pattern templates, Secure Service Facade      
Forces in security pattern templates, Secure Service Proxy      
Forces in security pattern templates, Secure Session Object      
Forces in security pattern templates, Single Sign-on Delegator      
Form validation      
Form validation in XML using Apache Struts      
Form validation, Web tier patterns      
Form-based authentication      
Form-based authentication in web.xml      
Form-based authentication, J2EE      2nd
Form-POST-based redirection      
Foundstone Enterprise testing tool      
Fowler, Martin      
Frameworks, security      
Frameworks, security in Secure Service Facade pattern      
Frameworks, security, adopting      
Front Controller pattern      2nd 3rd
FRR (False Reject Rate) probability      2nd
FTE (Failure to Enroll) probability      
Full View with Errors pattern      
Gambling casino      
Gang of Four (GoF) design patterns      
Gartner Group report      
gateways      
Gateways, Message Interceptor Gateway pattern      [See Message Interceptor Gateway pattern]
Gateways, Parlay      
generateKey method      
Generic products, XACML for      
genKeyPair method      
genPrivate method      
genPublic method      
getAction method      
getAlgorithm method      
getAllConfigContext method      
getApplicationBufferSize method      
getAssertionReply method      
getAuthenticationMethod method      
getCallerPrincipal method      2nd
getCallersIdentity method      
getConfigFile method      
getConfigProperties method      
getConnection method      
getContents method      
getContext method      
getData method      
getEncoded method      
getFormat method      
getInstance method      
getInstance method, Cipher      
getInstance method, KeyAgreement      
getInstance method, KeyGenerator      
getInstance method, KeyPairGenerator      
getInstance method, MBeanFactory      
getInstance method, MBeanManager      
getInstance method, MessageDigest      
getInstance method, Signature      
getMaxInactiveInterval method      
getPacketBufferSize method      
getPermissions method      
getPrincipal method      
getProtectionDomain method      
getProtocolBinding method      
getProtocolBinding method, AssertionContextImpl      
getProtocolBinding method, SSOContextImpl      
getProtocolBinding method, TokenContextImpl      
getRegistryFileName method      
getRemoteUser method      2nd
getSecurityInfo method      
getSecurityManager method      
getServiceName method      
getServiceStatus method      
getSession method      
getSessionInfo method      
getSSODelegator method      
getSSOTokenMap method      
getStatus method      
getSubject method      
getToken method      
getToken method, TokenContextImpl      
getToken method, UsernameToken      
getUserPrincipal method      2nd 3rd
GINA (Graphical Identification and Authentication)      
GINA Module      
GINA Module for biometrics      
GINA Module for smart cards      
GLB (Gramm-Leach-Bliley) Act      
Global logout      
Global logout in identity management      
Global logout, Liberty Alliance      
Global logout, SAML      
Global Platform technology      
Goals, security      
GoF (Gang of Four) design patterns      
Gramm-Leach-Bliley (GLB) Act      
GRANT statement      
Granularity      
Granularity, Container Managed Security pattern      
Granularity, Intercepting Web Agent pattern      
Graphical Identification and Authentication (GINA)      
groups      
Groups, identity management      
Groups, J2EE      
GSS-API      
HA      [See High availability (HA)]
Hand geometry      
handle method      
handlers      
Handshake messages      
Hardening      
Hardening in Web services patterns      
Hardening in Web tier security      
Hardware acceleration      
Hardware cryptographic devices      
Hardware cryptographic devices, Web services patterns      
Hardware cryptographic devices, Web tier patterns      
Headers in SOAP messages      
Health Insurance Privacy and Portability Act (HIPPA) of 1996      
helper classes      
Helper classes, AuditInterceptor      
Helper classes, EJB      
Hierarchical resource profiles      
High availability (HA)      
High availability (HA) in case study      
High availability (HA) in use cases      
High availability (HA), Identity management patterns      
High availability (HA), J2EE network topology      
High availability (HA), Message Interceptor Gateway pattern      
High availability (HA), Secure Message Router pattern      
HIPPA (Health Insurance Privacy and Portability Act) of 1996      
HMAC-MD5 algorithm      
honeypots      
Horizontal scaling      
Horizontal scaling, Business tier patterns      
Horizontal scaling, J2EE network topology      
Host operating systems      
Host security      
Host security in case study      
Host security in Web services patterns      
Host security, using JSSE      
HostnameVerifier class      
Hot Standby pattern      
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте