Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
HTTP      
HTTP, basic authentication      2nd 3rd
HTTP, digest authentication      
HTTP, POST messages      
HTTP, POST messages, identity management      
HTTP, POST messages, SAML      2nd
HTTP, POST messages, Web tier patterns      
HTTP, redirection      
HTTP, sessions      
HTTP, sessions in Web tier patterns      
HTTP, sessions, cookies and URL rewriting in      
HTTPS (HTTP over SSL)      
HTTPS (HTTP over SSL) for Web services      
HTTPS (HTTP over SSL), J2EE      2nd 3rd 4th
HTTPSClientUsingProxyTunnel.java program      
HTTPServletRequest objects      2nd
HttpsUrlConnection class      
Hub in Security Wheel      
I/O, non-blocking      
ID-FF (Identity Federated Framework) version 1.2      
ID-SIS (Identity Service Interface Specification) version      
ID-WSF (Identity Web Services Framework) version      
IDEA symmetric cipher      
Identification processes      
Identity Federated Framework (ID-FF) version 1.2      
Identity federation      2nd 3rd
Identity federation, cross-domain      
Identity federation, Liberty Alliance      
Identity federation, SAML      
Identity management      2nd 3rd 4th
Identity management in case study      2nd
Identity management in use cases      
Identity management, access control      [See Access control]
Identity management, access management services      
Identity management, auditing      2nd 3rd
Identity management, core issues      
Identity management, data synchronization services      
Identity management, directory services      
Identity management, importance      
Identity management, justifying      
Identity management, Liberty Alliance Project      [See Liberty Alliance Project]
Identity management, network identity      
Identity management, personal identification      [See Personal identification]
Identity management, point-to-point interfaces for      
Identity management, policies      
Identity management, provisioning services      
Identity management, references      2nd
Identity management, reporting services      
Identity management, SAML      [See SAML (Security Assertion Markup Language)]
Identity management, security patterns for      2nd 3rd
Identity management, security patterns for Assertion Builder      
Identity management, security patterns for best practices      
Identity management, security patterns for Credential Tokenizer      
Identity management, security patterns for factor analysis      
Identity management, security patterns for Password Synchronizer      
Identity management, security patterns for pitfalls      
Identity management, security patterns for references      
Identity management, security patterns for Single Sign-on Delegator      
Identity management, security patterns for Web services      
Identity management, service provisioning relationship      
Identity management, services for      
Identity management, single sign-on      [See Single sign-on (SSO) mechanisms]
Identity management, summary      2nd
Identity management, XACML      [See XACML (Extensible Access Control Markup Language)]
Identity Provider Agent strategy      
Identity Provider Discovery Profile      
Identity providers      
Identity providers, in case study      
Identity providers, Liberty Alliance      
Identity providers, Liberty specifications      
Identity providers, Message Inspector pattern      
Identity providers, Message Interceptor Gateway pattern      
Identity providers, Secure Message Router pattern      
Identity providers, Single Sign-on Delegator pattern      2nd
Identity providers, user account provisioning      
Identity providers, Web services      
Identity Service Interface Specification (ID-SIS) version      
Identity termination strategy      
Identity theft and spoofing      
Identity theft and spoofing, Assertion Builder pattern      
Identity theft and spoofing, Web services      
Identity Web Services Framework (ID-WSF) version      
IDSs (Intrusion Detection Systems)      
IETF Policy Management Working Group      
IMAP (Internet Message Access Protocol)      
Impact risk factor      
implementation      
Implementation, Assertion Builder pattern      
Implementation, AssertionContextImpl class      
Implementation, biometrics      
Implementation, JAAS authorization      
Implementation, LoginModule class      
Implementation, Policy Delegate pattern      
Implementation, Secure UP      2nd
Implementation, smart cards      
Implementation, SPML      
Implementation, UserNameTokem class      
implies method      
Importing certificates      2nd
Inclusive canonicalization encryption      
Information aggregators      
Informative policies      
Infrastructure      
Infrastructure in case study      2nd 3rd
Infrastructure in security patterns      
Infrastructure in security patterns, Business tier      
Infrastructure in security patterns, factor analysis      
Infrastructure in security patterns, Intercepting Web Agent      
Infrastructure in security patterns, Password Synchronizer      
Infrastructure in security patterns, Secure Pipe      
Infrastructure in security patterns, Web services      2nd
Infrastructure in security patterns, Web tier      
Infrastructure, Application Security Provider      
Infrastructure, J2EE      
Infrastructure, policies      
Infrastructure, Security Services      
init method      
init method, AuditClient      
init method, Cipher      
init method, HTTPProxy      
init method, MBeanFactory      
init method, MBeanManager      
init method, PasswordSyncLedger      
init method, PasswordSyncListener      
init method, Policy Delegate pattern      
init method, SimpleSOAPServiceSecurePolicy      
init method, TakeAction      
init method, WriteFileApplet      
initConfig method      
initConfig method, ServiceConfig      
initConfig method, SSODelegatorFactoryImpl      
Initialize method      
initialize method, KeyPairGenerator      
initialize method, LoginModule      
initSign method      
initVerify method      
Injection flaws      
Input validation failures      
Insider attacks      
Integration and Integration tier      
Integration and Integration tier in case study      
Integration and Integration tier in identity management      
Integration and Integration tier in patterns-driven design      
Integration and Integration tier in security patterns      
Integration and Integration tier in security patterns, Assertion Builder      
Integration and Integration tier in security patterns, Intercepting Web Agent      2nd
Integration and Integration tier in security patterns, Password Synchronizer      
Integration and Integration tier in security patterns, Secure Service Facade      
Integration and Integration tier in security patterns, Secure Service Proxy      
Integration and Integration tier, J2EE      
Integration and Integration tier, reality checks      
Integration and Integration tier, rule-based      
Integration and Integration tier, user account provisioning      
Integrity      
Integrity as security goal      
Integrity in Security Wheel      
Integrity, Secure Pipe pattern      2nd
Integrity, Web services      
intellectual property      
Intercepting Filter pattern      
Intercepting Filter pattern and Audit Interceptor pattern      
Intercepting Filter pattern and Authentication Enforcer pattern      
Intercepting Filter pattern and Intercepting Validator pattern      
Intercepting Validator pattern      
Intercepting Validator pattern and Secure Base Action pattern      2nd
Intercepting Validator pattern in case study      2nd 3rd 4th 5th
Intercepting Validator pattern, consequences      
Intercepting Validator pattern, forces      
Intercepting Validator pattern, participants and responsibilities      2nd
Intercepting Validator pattern, problem      
Intercepting Validator pattern, reality check      
Intercepting Validator pattern, related patterns      
Intercepting Validator pattern, security factors and risks      
Intercepting Validator pattern, solution      
Intercepting Validator pattern, strategies      
Intercepting Validator pattern, structure      
Intercepting Web Agent pattern      
Intercepting Web Agent pattern in case study      
Intercepting Web Agent pattern, consequences      
Intercepting Web Agent pattern, forces      
Intercepting Web Agent pattern, participants and responsibilities      
Intercepting Web Agent pattern, problem      
Intercepting Web Agent pattern, reality check      
Intercepting Web Agent pattern, related patterns      
Intercepting Web Agent pattern, related patterns, Container Managed Security      
Intercepting Web Agent pattern, related patterns, Secure Service Proxy      
Intercepting Web Agent pattern, sample code      
Intercepting Web Agent pattern, security factors and risks      
Intercepting Web Agent pattern, solution      
Intercepting Web Agent pattern, strategies      
Intercepting Web Agent pattern, structure      
Intercepting Web Agent strategy      
Interceptor strategy      
Interfaces      
Interfaces, CertPath      
Interfaces, JAAS      
Interfaces, JCA      
Interfaces, JCE      
Interfaces, JSSE      
Interfaces, Password Synchronizer pattern      
Interfaces, PKCS#11 and PKCS#15 standards
Interfaces, Policy Delegate pattern      
Interfaces, Secure Service Facade pattern      
Intermediary infrastructure      
Internet Message Access protocol (IMAP)      
Internet Scanner testing tool      
Interoperability      
Interoperability, Liberty Phase 1      
Interoperability, Secure Message Router pattern      
Interoperability, Secure Pipe pattern      
Interoperability, security provisioning patterns      
Interoperability, user account provisioning      
Interoperability, Web services      
Intrusion Detection Systems (IDSs)      
Invalid data      [See Intercepting Validator pattern]
Invalidating HTTP sessions      
Invocation, rule-based      
Invoke method      
IP address capture      
IP filtering      
Iris verification      
isAuthorized method      
isCallerInRole method      
isCallerInRole method, EJBContext      
isCallerInRole method, J2EE authorization      
Issuing authority in SAML      
isUserInRole method      2nd 3rd
isValidStatement method      
Iterative development in Secure UP      
ITS4 testing tool      
J2EE (Java 2 Enterprise Edition) platform
J2EE (Java 2 Enterprise Edition) platform for biometrics      2nd
J2EE (Java 2 Enterprise Edition) platform for smart cards
J2EE (Java 2 Enterprise Edition) platform for Web services      2nd
J2EE (Java 2 Enterprise Edition) platform, architecture and logical tiers
J2EE (Java 2 Enterprise Edition) platform, authorization      2nd 3rd
J2EE (Java 2 Enterprise Edition) platform, authorization, declarative
J2EE (Java 2 Enterprise Edition) platform, authorization, programmatic
J2EE (Java 2 Enterprise Edition) platform, authorization, web-tier
J2EE (Java 2 Enterprise Edition) platform, clients      2nd 3rd
J2EE (Java 2 Enterprise Edition) platform, component security      [See Component security]
J2EE (Java 2 Enterprise Edition) platform, container-based security      [See Container-based security]
J2EE (Java 2 Enterprise Edition) platform, definitions in
J2EE (Java 2 Enterprise Edition) platform, EIS tier      2nd
J2EE (Java 2 Enterprise Edition) platform, EIS tier, connector architecture in
J2EE (Java 2 Enterprise Edition) platform, EIS tier, JDBC in
J2EE (Java 2 Enterprise Edition) platform, EIS tier, JMS in
J2EE (Java 2 Enterprise Edition) platform, EJB tier      [See EJB tier in J2EE]
J2EE (Java 2 Enterprise Edition) platform, infrastructure
J2EE (Java 2 Enterprise Edition) platform, LDAP in
J2EE (Java 2 Enterprise Edition) platform, network topology
J2EE (Java 2 Enterprise Edition) platform, network topology, horizontal scalability
J2EE (Java 2 Enterprise Edition) platform, network topology, vertical scalability
J2EE (Java 2 Enterprise Edition) platform, references
J2EE (Java 2 Enterprise Edition) platform, SAML in
J2EE (Java 2 Enterprise Edition) platform, security patterns for
J2EE (Java 2 Enterprise Edition) platform, summary
J2ME (Java 2 Micro Edition)
J2ME (Java 2 Micro Edition), architecture
J2ME (Java 2 Micro Edition), configurations
J2ME (Java 2 Micro Edition), MIDlets in
J2ME (Java 2 Micro Edition), profiles
J2SE (Java 2 Standard Edition)
J2SE (Java 2 Standard Edition) in Obfuscated Transfer Object pattern
J2SE (Java 2 Standard Edition), J2SE 5.0
JAAS (Java Authentication and Authorization Service)      
JAAS Authorization policy file      
JAAS for biometrics      
JAAS Module      
JAAS vs. JGSS      
JAAS, authentication      
JAAS, authentication in clients      
JAAS, authentication, LoginModule      2nd 3rd
JAAS, authentication, Web tier      
JAAS, authorization      
JAAS, authorization, implementing      
JAAS, authorization, strategy      
JAAS, classes and interfaces      
JAAS, client-side callbacks      
JACC (Java Authorization Contract for Containers)      2nd
JAD (Java application descriptor) files      
JADTool utility      
JAR (Java archive format) files      
JAR (Java archive format) files in Web tier patterns      
JAR (Java archive format) files, for signed applets      
JAR (Java archive format) files, signing      
JAR (Java archive format) files, verifying      
Jarsigner tool      
Jarsigner tool for signed applets      
Jarsigner tool for smart cards      
Java 2 Enterprise Edition) platform      [See J2EE (Java 2 Enterprise Edition) platform]
Java 2 Micro Edition (J2ME)
Java 2 Micro Edition (J2ME), architecture
Java 2 Micro Edition (J2ME), configurations
Java 2 Micro Edition (J2ME), MIDlets in
Java 2 Micro Edition (J2ME), profiles
Java 2 platform security      2nd
Java 2 platform security, applet security
Java 2 platform security, applet security for smart cards
Java 2 platform security, applet security, Java Card
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте