Авторизация
Поиск по указателям
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Авторы: Steel Ch., Nagappan R., Lai R.
Аннотация: For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.
Язык:
Рубрика: Технология /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 2005
Количество страниц: 1088
Добавлена в каталог: 19.08.2007
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
Java 2 platform security, applet security, signed
Java 2 platform security, biometrics
Java 2 platform security, CertPath
Java 2 platform security, code
Java 2 platform security, code, obfuscation
Java 2 platform security, code, reverse engineering
Java 2 platform security, extensible
Java 2 platform security, importance
Java 2 platform security, J2EE [See J2EE (Java 2 Enterprise Edition) platform]
Java 2 platform security, J2ME [See Java 2 Micro Edition (J2ME)]
Java 2 platform security, JAAS [See JAAS (Java Authentication and Authorization Service)]
Java 2 platform security, Java Card technology 2nd
Java 2 platform security, Java Card technology, API framework
Java 2 platform security, Java Card technology, applets in
Java 2 platform security, Java Card technology, development kit
Java 2 platform security, Java Card technology, model for
Java 2 platform security, Java Card technology, smart cards
Java 2 platform security, JCA [See JCA (Java Cryptography Architecture)]
Java 2 platform security, JCE [See JCE (Java Cryptographic Extensions)]
Java 2 platform security, JGSS
Java 2 platform security, JSSE [See JSSE (Java Secure Socket Extension)]
Java 2 platform security, JVM
Java 2 platform security, JWS
Java 2 platform security, language
Java 2 platform security, MIDlets
Java 2 platform security, MIDlets, components of
Java 2 platform security, MIDlets, signed
Java 2 platform security, MIDlets, trusted
Java 2 platform security, references
Java 2 platform security, reusable components
Java 2 platform security, SASL
Java 2 platform security, SASL, clients 2nd
Java 2 platform security, SASL, installing
Java 2 platform security, SASL, servers
Java 2 platform security, security model
Java 2 platform security, security model, AccessController
Java 2 platform security, security model, bytecode verifiers
Java 2 platform security, security model, ClassLoader
Java 2 platform security, security model, codebase
Java 2 platform security, security model, CodeSource
Java 2 platform security, security model, permissions
Java 2 platform security, security model, policies
Java 2 platform security, security model, protection domains
Java 2 platform security, security model, SecurityManager
Java 2 platform security, summary
Java 2 platform security, tools
Java 2 platform security, tools, jarsigner
Java 2 platform security, tools, keystores 2nd
Java 2 platform security, tools, keytool
Java 2 platform security, tools, policytool
Java 2 platform security, Web services
Java 2 Standard Edition (J2SE)
Java 2 Standard Edition (J2SE) in Obfuscated Transfer Object pattern
Java 2 Standard Edition (J2SE), J2SE 5.0
Java Access Manager
Java API for XML Registry (JAXR)
Java application descriptor (JAD) files
Java archive format (JAR) files
Java archive format (JAR) files for signed applets
Java archive format (JAR) files in Web tier patterns
Java archive format (JAR) files, signing
Java archive format (JAR) files, verifying
Java Authentication and Authorization Service [See JAAS (Java Authentication and Authorization Service)]
Java Authorization Contract for Containers (JACC) 2nd
Java Card runtime environment (JCRE)
Java Card technology 2nd
Java Card technology, API framework
Java Card technology, applets in
Java Card technology, development kit
Java Card technology, model for
Java Card technology, smart cards
Java Card Workstation Development Environment (JCWDE)
Java Certification Path
Java Cryptographic Extension Keystores (JCEKS)
Java Cryptographic Extensions [See JCE (Java Cryptographic Extensions)]
Java Cryptography Architecture [See JCA (Java Cryptography Architecture)]
Java Data Objects (JDO) 2nd
Java Database Connectivity (JDBC) 2nd
Java Development Kit (JDK)
Java Generic Secure Services (JGSS)
Java GSS-API
Java Management Extension (JMX) technology
Java Message Service (JMS)
Java Message Service (JMS), Audit Interceptor pattern
Java Message Service (JMS), EIS tier 2nd
Java Naming and Directory Interface (JNDI)
Java native code (JNI)
Java Network Launch protocol (JNLP)
Java Secure Socket Extension (JSSE) [See JSSE (Java Secure Socket Extension)]
Java System Access Manager 2nd
Java system web server
Java virtual machine (JVM)
Java Web Services Developer Pack (JWSDP)
Java Web Start (JWS) security
Java.security file
Javac command
Javax.net.* package
Javax.net.ssl.* package
Javax.security.auth package
Javax.security.cert.* package
JAX-RPC API
JAX-RPC API for Web services
JAX-RPC API in case study
JAX-RPC API in Message Inspector pattern
JAXR (Java API for XML Registry)
JCA (Java Cryptography Architecture)
JCA, API
JCA, classes and interfaces
JCA, cryptographic services
JCA, digital signature generation
JCA, key pair generation
JCA, message digests
JCE (Java Cryptographic Extensions)
JCE, Advanced Encryption Standard
JCE, API
JCE, classes and interfaces
JCE, Cryptographic Service Providers
JCE, encryption and decryption 2nd
JCE, hardware acceleration
JCE, key agreement protocols
JCE, MAC objects
JCE, Password-Based Encryption
JCE, sealed objects
JCE, smart card support
JCE, strong vs. unlimited strength cryptography
JCEKS (Java Cryptographic Extension Keystores)
JCRE (Java Card runtime environment)
JCWDE (Java Card Workstation Development Environment)
JDBC (Java Database Connectivity) 2nd
JDK (Java Development Kit)
JDO (Java Data Objects) 2nd
JGSS (Java Generic Secure Services)
JiffyXACML
JKS (Java keystores)
JMS (Java Message Service)
JMS, in Audit Interceptor pattern
JMS, in EIS tier 2nd
JMX (Java Management Extension) technology
JNDI (Java Naming and Directory Interface)
JNI (Java native code)
JNLP (Java Network Launch protocol)
Journaled Component pattern
JSPs
JSSE (Java Secure Socket Extension)
JSSE, API programming in
JSSE, application layer using
JSSE, classes and interfaces
JSSE, client-side communication
JSSE, host name verification
JSSE, HTTP over SSL
JSSE, mutual authentication
JSSE, providers
JSSE, secure socket connections using SSL
JSSE, server-side communication
JSSE, SSLEngine and non-blocking I/O
JSSE, vs. JGSS
Justifications
Justifications, compliance
Justifications, identity and access management
Justifications, proactive security approaches
JVM (Java Virtual Machine)
JVMDI debugger
JVMPI profiling code
JWS (Java Web Start) security
JWSDP (Java Web Services Developer Pack)
K Virtual Machine (KVM)
Kerberos
Kerberos in JAAS Login Module strategy
Kerberos in JGSS
Kerievsky, Joshua
Key agreement encryption
Key agreement encryption, JCE
Key agreement encryption, XML
KeyAgreement class 2nd
KeyFactory class
KeyGenerator class
KeyPairGenerator class
Keys and key management
Keys and key management, asymmetric ciphers
Keys and key management, Credential Tokenizer patterns
Keys and key management, in assessment checklists
Keys and key management, in certificates [See Certificates and certificate keys]
Keys and key management, key pairs
Keys and key management, key pairs in applets
Keys and key management, key pairs in JCA
Keys and key management, key pairs, keytool for
Keys and key management, LDAP 2nd
Keys and key management, PGP
Keys and key management, Secure Logger pattern
Keys and key management, Security Services
Keys and key management, symmetric ciphers
Keys and key management, transport algorithms
Keys and key management, XML [See XKMS (XML key management system)]
KeyStore class
KeyStore property
Keystore tool 2nd
Keystores
Keystores, cryptographic devices based
Keystores, databases
Keystores, deleting
Keystores, exporting certificates from
Keystores, importing certificates to
Keystores, listing entries in
Keystores, passwords for
Keytool tool 2nd
Keytool tool for CSRs
Keytool tool for deleting keystores
Keytool tool for exporting keystore certificates
Keytool tool for importing keystore certificates
Keytool tool for keystore databases
Keytool tool for keystore entry lists
Keytool tool for keystore passwords
Keytool tool for printing certificate information
Keytool tool for private/public key pairs
Keytool tool for signed applets
Keytool tool for smart cards
Ktoolbar tool
KVM (K Virtual Machine)
Labeling
Labeling in security patterns
Labeling in Security Wheel
Layered Security pattern
LDAP (Lightweight Directory Access Protocol)
LDAP, certificate revocation issues
LDAP, cryptography challenges
LDAP, J2EE
LDAP, key management
LDAP, random number generation
LDAP, SASL 2nd
LDAP, trust models
Leaf nodes in attack trees
Ledger 2nd
Legacy systems
Legacy systems, Intercepting Web Agent pattern 2nd
Legacy systems, Password Synchronizer pattern
Legacy systems, Secure Service Proxy pattern
Lessons learned in case study
Liberty Alliance consortium
Liberty Alliance Project
Liberty Alliance Project for SAML
Liberty Alliance Project, architecture
Liberty Alliance Project, Liberty Phase 1
Liberty Alliance Project, Liberty Phase 2
Liberty Alliance Project, meta-data and schemas
Liberty Alliance Project, relationships
Liberty Alliance Project, security mechanisms
Liberty Alliance Project, SSO strategy
Liberty Alliance Project, usage scenarios
Liberty Alliance Project, usage scenarios, communication security
Liberty Alliance Project, usage scenarios, credentials
Liberty Alliance Project, usage scenarios, federation management
Liberty Alliance Project, usage scenarios, global logouts
Liberty Alliance Project, usage scenarios, identity registration and termination
Liberty Alliance Project, usage scenarios, Java System Access Manager
Liberty Alliance Project, usage scenarios, multi-tiered authentication
Liberty Alliance Project, usage scenarios, provider session state maintenance
Liberty Alliance Project, usage scenarios, single sign-on 2nd
Liberty Alliance Project, Web redirection in
Liberty Alliance Project, Web services in
Liberty-enabled clients
Liberty-enabled proxies
Libraries
Libraries, DLL
Libraries, tag
Licenses in WS-Security
Lightweight Directory Access Protocol [See LDAP (Lightweight Directory Access Protocol)]
Limited View pattern
Load Balancing PEP pattern
Load-balancing in case study
loadRegistry method
Locate service in X-KISS
LogFactory class
logging
Logging in biometrics
Logging in case study
Logging in security patterns
Logging in security patterns, Identity management
Logging in security patterns, Password Synchronizer
Logging in security patterns, Policy Delegate
Logging in security patterns, Secure Base Action
Logging in security patterns, Secure Logger [See Secure Logger pattern]
Logging in security patterns, Single Sign-on Delegator
Logging in security patterns, Web services
Logging in Security Wheel
Logging out in JAAS
Logging, alteration detection for 2nd
Logging, failures
LoggingHandler.java file
Logical access control
Logical architecture
Logical architecture, biometric systems
Logical architecture, smart cards
Logical architecture, user account provisioning
Logical tiers in J2EE
Logical views in use cases
Login attempts in biometrics
login method
login method, Authentication Enforcer
login method, LoginContext 2nd 3rd
login method, LoginModule
Реклама