Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Java 2 platform security, applet security, signed
Java 2 platform security, biometrics
Java 2 platform security, CertPath
Java 2 platform security, code
Java 2 platform security, code, obfuscation
Java 2 platform security, code, reverse engineering
Java 2 platform security, extensible
Java 2 platform security, importance
Java 2 platform security, J2EE      [See J2EE (Java 2 Enterprise Edition) platform]
Java 2 platform security, J2ME      [See Java 2 Micro Edition (J2ME)]
Java 2 platform security, JAAS      [See JAAS (Java Authentication and Authorization Service)]
Java 2 platform security, Java Card technology      2nd
Java 2 platform security, Java Card technology, API framework
Java 2 platform security, Java Card technology, applets in
Java 2 platform security, Java Card technology, development kit
Java 2 platform security, Java Card technology, model for
Java 2 platform security, Java Card technology, smart cards
Java 2 platform security, JCA      [See JCA (Java Cryptography Architecture)]
Java 2 platform security, JCE      [See JCE (Java Cryptographic Extensions)]
Java 2 platform security, JGSS
Java 2 platform security, JSSE      [See JSSE (Java Secure Socket Extension)]
Java 2 platform security, JVM
Java 2 platform security, JWS
Java 2 platform security, language
Java 2 platform security, MIDlets
Java 2 platform security, MIDlets, components of
Java 2 platform security, MIDlets, signed
Java 2 platform security, MIDlets, trusted
Java 2 platform security, references
Java 2 platform security, reusable components
Java 2 platform security, SASL
Java 2 platform security, SASL, clients      2nd
Java 2 platform security, SASL, installing
Java 2 platform security, SASL, servers
Java 2 platform security, security model
Java 2 platform security, security model, AccessController
Java 2 platform security, security model, bytecode verifiers
Java 2 platform security, security model, ClassLoader
Java 2 platform security, security model, codebase
Java 2 platform security, security model, CodeSource
Java 2 platform security, security model, permissions
Java 2 platform security, security model, policies
Java 2 platform security, security model, protection domains
Java 2 platform security, security model, SecurityManager
Java 2 platform security, summary
Java 2 platform security, tools
Java 2 platform security, tools, jarsigner
Java 2 platform security, tools, keystores      2nd
Java 2 platform security, tools, keytool
Java 2 platform security, tools, policytool
Java 2 platform security, Web services
Java 2 Standard Edition (J2SE)
Java 2 Standard Edition (J2SE) in Obfuscated Transfer Object pattern
Java 2 Standard Edition (J2SE), J2SE 5.0
Java Access Manager      
Java API for XML Registry (JAXR)      
Java application descriptor (JAD) files      
Java archive format (JAR) files      
Java archive format (JAR) files for signed applets      
Java archive format (JAR) files in Web tier patterns      
Java archive format (JAR) files, signing      
Java archive format (JAR) files, verifying      
Java Authentication and Authorization Service      [See JAAS (Java Authentication and Authorization Service)]
Java Authorization Contract for Containers (JACC)      2nd
Java Card runtime environment (JCRE)      
Java Card technology      2nd
Java Card technology, API framework      
Java Card technology, applets in      
Java Card technology, development kit      
Java Card technology, model for      
Java Card technology, smart cards      
Java Card Workstation Development Environment (JCWDE)      
Java Certification Path      
Java Cryptographic Extension Keystores (JCEKS)      
Java Cryptographic Extensions      [See JCE (Java Cryptographic Extensions)]
Java Cryptography Architecture      [See JCA (Java Cryptography Architecture)]
Java Data Objects (JDO)      2nd
Java Database Connectivity (JDBC)      2nd
Java Development Kit (JDK)      
Java Generic Secure Services (JGSS)      
Java GSS-API      
Java Management Extension (JMX) technology      
Java Message Service (JMS)      
Java Message Service (JMS), Audit Interceptor pattern      
Java Message Service (JMS), EIS tier      2nd
Java Naming and Directory Interface (JNDI)      
Java native code (JNI)      
Java Network Launch protocol (JNLP)      
Java Secure Socket Extension (JSSE)      [See JSSE (Java Secure Socket Extension)]
Java System Access Manager      2nd
Java system web server      
Java virtual machine (JVM)      
Java Web Services Developer Pack (JWSDP)      
Java Web Start (JWS) security      
Java.security file      
Javac command      
Javax.net.* package      
Javax.net.ssl.* package      
Javax.security.auth package      
Javax.security.cert.* package      
JAX-RPC API      
JAX-RPC API for Web services      
JAX-RPC API in case study      
JAX-RPC API in Message Inspector pattern      
JAXR (Java API for XML Registry)      
JCA (Java Cryptography Architecture)      
JCA, API      
JCA, classes and interfaces      
JCA, cryptographic services      
JCA, digital signature generation      
JCA, key pair generation      
JCA, message digests      
JCE (Java Cryptographic Extensions)      
JCE, Advanced Encryption Standard      
JCE, API      
JCE, classes and interfaces      
JCE, Cryptographic Service Providers      
JCE, encryption and decryption      2nd
JCE, hardware acceleration      
JCE, key agreement protocols      
JCE, MAC objects      
JCE, Password-Based Encryption      
JCE, sealed objects      
JCE, smart card support      
JCE, strong vs. unlimited strength cryptography      
JCEKS (Java Cryptographic Extension Keystores)      
JCRE (Java Card runtime environment)      
JCWDE (Java Card Workstation Development Environment)      
JDBC (Java Database Connectivity)      2nd
JDK (Java Development Kit)      
JDO (Java Data Objects)      2nd
JGSS (Java Generic Secure Services)      
JiffyXACML      
JKS (Java keystores)      
JMS (Java Message Service)      
JMS, in Audit Interceptor pattern      
JMS, in EIS tier      2nd
JMX (Java Management Extension) technology      
JNDI (Java Naming and Directory Interface)      
JNI (Java native code)      
JNLP (Java Network Launch protocol)      
Journaled Component pattern      
JSPs      
JSSE (Java Secure Socket Extension)      
JSSE, API programming in      
JSSE, application layer using      
JSSE, classes and interfaces      
JSSE, client-side communication      
JSSE, host name verification      
JSSE, HTTP over SSL      
JSSE, mutual authentication      
JSSE, providers      
JSSE, secure socket connections using SSL      
JSSE, server-side communication      
JSSE, SSLEngine and non-blocking I/O      
JSSE, vs. JGSS      
Justifications      
Justifications, compliance      
Justifications, identity and access management      
Justifications, proactive security approaches      
JVM (Java Virtual Machine)      
JVMDI debugger      
JVMPI profiling code      
JWS (Java Web Start) security      
JWSDP (Java Web Services Developer Pack)      
K Virtual Machine (KVM)      
Kerberos      
Kerberos in JAAS Login Module strategy      
Kerberos in JGSS      
Kerievsky, Joshua      
Key agreement encryption      
Key agreement encryption, JCE      
Key agreement encryption, XML      
KeyAgreement class      2nd
KeyFactory class      
KeyGenerator class      
KeyPairGenerator class      
Keys and key management      
Keys and key management, asymmetric ciphers      
Keys and key management, Credential Tokenizer patterns      
Keys and key management, in assessment checklists      
Keys and key management, in certificates      [See Certificates and certificate keys]
Keys and key management, key pairs      
Keys and key management, key pairs in applets      
Keys and key management, key pairs in JCA      
Keys and key management, key pairs, keytool for      
Keys and key management, LDAP      2nd
Keys and key management, PGP      
Keys and key management, Secure Logger pattern      
Keys and key management, Security Services      
Keys and key management, symmetric ciphers      
Keys and key management, transport algorithms      
Keys and key management, XML      [See XKMS (XML key management system)]
KeyStore class      
KeyStore property      
Keystore tool      2nd
Keystores      
Keystores, cryptographic devices based      
Keystores, databases      
Keystores, deleting      
Keystores, exporting certificates from      
Keystores, importing certificates to      
Keystores, listing entries in      
Keystores, passwords for      
Keytool tool      2nd
Keytool tool for CSRs      
Keytool tool for deleting keystores      
Keytool tool for exporting keystore certificates      
Keytool tool for importing keystore certificates      
Keytool tool for keystore databases      
Keytool tool for keystore entry lists      
Keytool tool for keystore passwords      
Keytool tool for printing certificate information      
Keytool tool for private/public key pairs      
Keytool tool for signed applets      
Keytool tool for smart cards      
Ktoolbar tool      
KVM (K Virtual Machine)      
Labeling      
Labeling in security patterns      
Labeling in Security Wheel      
Layered Security pattern      
LDAP (Lightweight Directory Access Protocol)      
LDAP, certificate revocation issues      
LDAP, cryptography challenges      
LDAP, J2EE      
LDAP, key management      
LDAP, random number generation      
LDAP, SASL      2nd
LDAP, trust models      
Leaf nodes in attack trees      
Ledger      2nd
Legacy systems      
Legacy systems, Intercepting Web Agent pattern      2nd
Legacy systems, Password Synchronizer pattern      
Legacy systems, Secure Service Proxy pattern      
Lessons learned in case study      
Liberty Alliance consortium      
Liberty Alliance Project      
Liberty Alliance Project for SAML      
Liberty Alliance Project, architecture      
Liberty Alliance Project, Liberty Phase 1      
Liberty Alliance Project, Liberty Phase 2      
Liberty Alliance Project, meta-data and schemas      
Liberty Alliance Project, relationships      
Liberty Alliance Project, security mechanisms      
Liberty Alliance Project, SSO strategy      
Liberty Alliance Project, usage scenarios      
Liberty Alliance Project, usage scenarios, communication security      
Liberty Alliance Project, usage scenarios, credentials      
Liberty Alliance Project, usage scenarios, federation management      
Liberty Alliance Project, usage scenarios, global logouts      
Liberty Alliance Project, usage scenarios, identity registration and termination      
Liberty Alliance Project, usage scenarios, Java System Access Manager      
Liberty Alliance Project, usage scenarios, multi-tiered authentication      
Liberty Alliance Project, usage scenarios, provider session state maintenance      
Liberty Alliance Project, usage scenarios, single sign-on      2nd
Liberty Alliance Project, Web redirection in      
Liberty Alliance Project, Web services in      
Liberty-enabled clients      
Liberty-enabled proxies      
Libraries      
Libraries, DLL      
Libraries, tag      
Licenses in WS-Security      
Lightweight Directory Access Protocol      [See LDAP (Lightweight Directory Access Protocol)]
Limited View pattern      
Load Balancing PEP pattern      
Load-balancing in case study      
loadRegistry method      
Locate service in X-KISS      
LogFactory class      
logging      
Logging in biometrics      
Logging in case study      
Logging in security patterns      
Logging in security patterns, Identity management      
Logging in security patterns, Password Synchronizer      
Logging in security patterns, Policy Delegate      
Logging in security patterns, Secure Base Action      
Logging in security patterns, Secure Logger      [See Secure Logger pattern]
Logging in security patterns, Single Sign-on Delegator      
Logging in security patterns, Web services      
Logging in Security Wheel      
Logging out in JAAS      
Logging, alteration detection for      2nd
Logging, failures      
LoggingHandler.java file      
Logical access control      
Logical architecture      
Logical architecture, biometric systems      
Logical architecture, smart cards      
Logical architecture, user account provisioning      
Logical tiers in J2EE      
Logical views in use cases      
Login attempts in biometrics      
login method      
login method, Authentication Enforcer      
login method, LoginContext      2nd 3rd
login method, LoginModule      
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте