Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Encryption and cryptography, signatures in      [See Signatures]
Encryption and cryptography, SSL in      
Encryption and cryptography, symmetric ciphers      
Encryption and cryptography, TLS in      
Encryption and cryptography, weak      
Encryption and cryptography, Web services patterns      2nd 3rd
Encryption and cryptography, Web tier patterns      
Encryption and cryptography, WS-Security      2nd
Encryption and cryptography, XML      [See XML (Extensible Markup Language)]
EncryptionHelper class      
Encryptor class      
End-to-end transport layer security      
Endpoints in case study      
Engine classes      
Engine classes, JCA      
Engine classes, JCE      
Enhanced Client and Proxy (ECP) profile      
Enrollment systems      
Enrollment systems, biometrics      2nd
Enrollment systems, smart card      2nd
Enterprise Java Beans (EJBs)      
Enterprise Java Beans (EJBs), Container Managed Security pattern      
Enterprise Java Beans (EJBs), declarative security for      
Enterprise Java Beans (EJBs), for programmatic security      
Enterprise Java Beans (EJBs), helper classes in      
Enterprise Java Beans (EJBs), in case study      
Enterprise Privacy Authorization Language (EPAL)      
Enterprise-information system (EIS) tier      2nd
Enterprise-information system (EIS) tier, connector architecture in      
Enterprise-information system (EIS) tier, JDBC in      
Enterprise-information system (EIS) tier, JMS in      
EnterpriseService class      
Entitlement in Web services      
Entity management      
Enveloped Signature transform algorithms      
Enveloped signatures      
Envelopes in SOAP messages      
Enveloping signatures      
Enveloping signatures, examples
Enveloping signatures, XML      
Environment setup in Secure UP      
EPAL (Enterprise Privacy Authorization Language)      
EPCGlobal standards      
EPCs (Electronic Product Codes)      
Equal Error Rate (EER) probability      
ERewards Membership Service      [See Case study]
Errors and error handling      
Errors and error handling, improper      
Errors and error handling, reporting
Errors and error handling, SPML      
Errors and error handling, translation      
European Union (EU) Data Protection Directive      
EventCatalog class
Exclusive canonicalization encryption
execute method
execute method, Policy Delegate pattern
execute method, PolicyDelegateInterface
execute method, Secure Base Action pattern      
execute method, SecureSessionFacadeSessionBean      
executeAsPrivileged method
expertise
Expertise, Message Interceptor Gateway pattern
Expertise, problems in
Exporting
Exporting, keystore certificates
Exporting, policies for      
Exposure risk factor      
Extended SPML operations
extensibility
Extensibility, Message Inspector pattern
Extensibility, Message Interceptor Gateway pattern
Extensibility, Secure Logger pattern
Extensibility, Secure Message Router pattern      
Extensibility, SPML
Extensibility, user account provisioning      2nd
Extensible Access Control Markup Language      [See XACML (Extensible Access Control Markup Language)]
Extensible Markup Language      [See XML (Extensible Markup Language)]
Extensible Rights Markup Language (XrML)      
External policy server strategy      
Extract Adapter pattern      
Facial recognition
Factor analysis      
Factor analysis for security patterns      
Factor analysis in case study      
Factory pattern      
failover      
Failover, J2EE network topology      
Failover, service
Failure to Enroll (FTE) probability      
False Acceptance Rate (FAR) probability      2nd
False Match Rate (FMR) probability
False Non-Match Rate (FNMR) probability      
False Reject Rate (FRR) probability      2nd
FAR (False Acceptance Rate) probability      2nd
Fault handling      
Fault tolerance
Fault tolerance, J2EE network topology      
Fault tolerance, Message Interceptor Gateway pattern
Fault tolerance, Secure Message Router pattern
Fault tolerance, Web services patterns
FBI survey      
Federal regulations      2nd
Federal Trade Commission survey
Federated affiliates      
Federated data exchange
Federated identity      2nd
Federated SSO      2nd
Federation management in Liberty Alliance      
Federation services
Federation termination protocol
Federations, cross-domain      
fileChanged method
Final classes in Java
Financial losses
Financial losses, from confidentiality breaches
Financial losses, reported      
Financial Privacy Rule      
Financial Services Modernization Act
findApplicationId method
Fine-grained security      
Fingerprint matching
Fingerprint matching, approaches to      
Fingerprint matching, logical architecture
Fingerprints, key
Finished messages      
Firewalls      
Firewalls for Java Card applets
Firewalls, DMZs for      
Firewalls, Secure Service Proxy pattern
Firewalls, Web services patterns      
Firewalls, Web tier patterns      
Firewalls, XML      2nd
Flag values in JAAS      2nd
Flexibility in security patterns      
Flexibility in security patterns, Intercepting Web Agent      
Flexibility in security patterns, Secure Base Action      
Flexibility in security patterns, Secure Service Proxy      
Flexibility in security patterns, Single Sign-on Delegator      
FMR (False Match Rate) probability      
FNMR (False Non-Match Rate) probability
Forces in security pattern templates      
Forces in security pattern templates, Assertion Builder
Forces in security pattern templates, Audit Interceptor      
Forces in security pattern templates, Authentication Enforcer
Forces in security pattern templates, Authorization Enforcer
Forces in security pattern templates, Container Managed Security
Forces in security pattern templates, Credential Tokenizer
Forces in security pattern templates, Dynamic Service Management      
Forces in security pattern templates, Intercepting Validator      
Forces in security pattern templates, Intercepting Web Agent
Forces in security pattern templates, Message Inspector
Forces in security pattern templates, Message Interceptor Gateway
Forces in security pattern templates, Obfuscated Transfer Object      
Forces in security pattern templates, Password Synchronizer      
Forces in security pattern templates, Policy Delegate      
Forces in security pattern templates, Secure Base Action      
Forces in security pattern templates, Secure Logger
Forces in security pattern templates, Secure Message Router
Forces in security pattern templates, Secure Pipe      
Forces in security pattern templates, Secure Service Facade
Forces in security pattern templates, Secure Service Proxy
Forces in security pattern templates, Secure Session Object
Forces in security pattern templates, Single Sign-on Delegator
Form validation
Form validation in XML using Apache Struts      
Form validation, Web tier patterns
Form-based authentication
Form-based authentication in web.xml
Form-based authentication, J2EE      2nd
Form-POST-based redirection
Foundstone Enterprise testing tool
Fowler, Martin
Frameworks, security
Frameworks, security in Secure Service Facade pattern
Frameworks, security, adopting
Front Controller pattern      2nd 3rd
FRR (False Reject Rate) probability      2nd
FTE (Failure to Enroll) probability      
Full View with Errors pattern
Gambling casino
Gang of Four (GoF) design patterns
Gartner Group report
gateways
Gateways, Message Interceptor Gateway pattern      [See Message Interceptor Gateway pattern]
Gateways, Parlay
generateKey method
Generic products, XACML for
genKeyPair method      
genPrivate method
genPublic method
getAction method
getAlgorithm method
getAllConfigContext method
getApplicationBufferSize method
getAssertionReply method
getAuthenticationMethod method      
getCallerPrincipal method      2nd
getCallersIdentity method      
getConfigFile method
getConfigProperties method      
getConnection method
getContents method
getContext method
getData method
getEncoded method
getFormat method
getInstance method
getInstance method, Cipher
getInstance method, KeyAgreement
getInstance method, KeyGenerator
getInstance method, KeyPairGenerator
getInstance method, MBeanFactory      
getInstance method, MBeanManager
getInstance method, MessageDigest
getInstance method, Signature
getMaxInactiveInterval method
getPacketBufferSize method
getPermissions method      
getPrincipal method
getProtectionDomain method
getProtocolBinding method
getProtocolBinding method, AssertionContextImpl      
getProtocolBinding method, SSOContextImpl
getProtocolBinding method, TokenContextImpl
getRegistryFileName method
getRemoteUser method      2nd
getSecurityInfo method
getSecurityManager method      
getServiceName method
getServiceStatus method
getSession method
getSessionInfo method      
getSSODelegator method
getSSOTokenMap method
getStatus method
getSubject method
getToken method
getToken method, TokenContextImpl
getToken method, UsernameToken
getUserPrincipal method      2nd 3rd
GINA (Graphical Identification and Authentication)      
GINA Module
GINA Module for biometrics
GINA Module for smart cards
GLB (Gramm-Leach-Bliley) Act      
Global logout      
Global logout in identity management      
Global logout, Liberty Alliance      
Global logout, SAML      
Global Platform technology      
Goals, security
GoF (Gang of Four) design patterns      
Gramm-Leach-Bliley (GLB) Act      
GRANT statement      
Granularity
Granularity, Container Managed Security pattern      
Granularity, Intercepting Web Agent pattern
Graphical Identification and Authentication (GINA)
groups
Groups, identity management
Groups, J2EE      
GSS-API      
HA      [See High availability (HA)]
Hand geometry      
handle method      
handlers      
Handshake messages      
Hardening
Hardening in Web services patterns
Hardening in Web tier security
Hardware acceleration
Hardware cryptographic devices
Hardware cryptographic devices, Web services patterns
Hardware cryptographic devices, Web tier patterns      
Headers in SOAP messages
Health Insurance Privacy and Portability Act (HIPPA) of 1996
helper classes      
Helper classes, AuditInterceptor
Helper classes, EJB
Hierarchical resource profiles      
High availability (HA)      
High availability (HA) in case study      
High availability (HA) in use cases      
High availability (HA), Identity management patterns      
High availability (HA), J2EE network topology
High availability (HA), Message Interceptor Gateway pattern      
High availability (HA), Secure Message Router pattern
HIPPA (Health Insurance Privacy and Portability Act) of 1996
HMAC-MD5 algorithm      
honeypots      
Horizontal scaling      
Horizontal scaling, Business tier patterns      
Horizontal scaling, J2EE network topology      
Host operating systems      
Host security      
Host security in case study      
Host security in Web services patterns      
Host security, using JSSE      
HostnameVerifier class      
Hot Standby pattern
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2025
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте