Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Login service in case study      
LoginContext class      
LoginContext class, JAAS authentication      2nd
LoginContext class, JAAS Login Module strategy      2nd
LoginModule class      
LoginModule class, Authentication Enforcer pattern      
LoginModule class, biometrics      
LoginModule class, implementing      
LoginModule class, providers for      
LoginModule class, smart cards      
LogManager class      
logout method      
logout method, LoginContext      
logout method, LoginModule      
Logout requests in SAML      
Loosely coupled architecture      
Loosely coupled architecture, Intercepting Web Agent pattern      
Loosely coupled architecture, Secure Service Proxy pattern      
Lost smart cards      
Low-level KVM security      
MAC (message authentication code)      2nd
Mac class      
Magnus.conf file      
Maintainability in security patterns      
Maintainability in security patterns, Audit Interceptor      
Maintainability in security patterns, Intercepting Web Agent      
Maintainability in security patterns, Message Inspector      
Maintainability in security patterns, Message Interceptor Gateway      
Maintainability in security patterns, Secure Message Router      
Malicious code prevention      [See Intercepting Validator pattern]
Man-in-the-middle (MITM) attacks      
Man-in-the-middle (MITM) attacks in case study      
Man-in-the-middle (MITM) attacks in SAML      
Man-in-the-middle (MITM) attacks in Web services      
Manageability      
Manageability, J2EE network topology      
Manageability, Secure Base Action pattern      
Manageability, Secure Logger pattern      
manifest files      
Manipulation attacks      
Mapping      
Mapping in Container Managed Security pattern      
Mapping, SAML attributes      
Mapping, user account      
Masked list strategy      
Match-off-the-card strategy      2nd
Match-on-the-card strategy      2nd 3rd
Matrix, Effect      
MBean strategy      
MBeanFactory class      
MBeanFactory.java file      
MBeanManager.java file      
MBeanServer class      
MD5 cryptography      
MD5 cryptography, Cryptographic Service Providers      
MD5 cryptography, JCA message digests      
Media in security pattern factor analysis      
Memory      
memory cards      
Memory for Secure Session Object pattern      
Memory in smart cards      
Message authentication code (MAC)      2nd
Message authentication encryption      
Message Configurators      2nd
Message digests      
Message digests, encryption algorithms for      
Message digests, JCA      
Message injection attacks      
Message Inspector pattern      2nd
Message Inspector pattern, consequences      
Message Inspector pattern, forces      
Message Inspector pattern, in case study      2nd 3rd 4th
Message Inspector pattern, participants and responsibilities      
Message Inspector pattern, problem      
Message Inspector pattern, reality checks      
Message Inspector pattern, related patterns      
Message Inspector pattern, related patterns, Intercepting Validator      
Message Inspector pattern, related patterns, Message Interceptor Gateway      
Message Inspector pattern, related patterns, Secure Message Router      
Message Inspector pattern, security factors and risks      
Message Inspector pattern, solution      
Message Inspector pattern, strategies      
Message Inspector pattern, structure      
Message Interceptor Gateway pattern      2nd
Message Interceptor Gateway pattern in case study      2nd 3rd
Message Interceptor Gateway pattern, consequences      
Message Interceptor Gateway pattern, forces      
Message Interceptor Gateway pattern, participants and responsibilities      
Message Interceptor Gateway pattern, problem      
Message Interceptor Gateway pattern, reality check      
Message Interceptor Gateway pattern, related patterns      
Message Interceptor Gateway pattern, related patterns, Audit Interceptor      
Message Interceptor Gateway pattern, related patterns, Intercepting Web Agent      
Message Interceptor Gateway pattern, related patterns, Message Inspector      2nd
Message Interceptor Gateway pattern, related patterns, Secure Message Router      
Message Interceptor Gateway pattern, security factors and risks      
Message Interceptor Gateway pattern, solution      
Message Interceptor Gateway pattern, strategies      
Message Interceptor Gateway pattern, structure      
Message replay      
Message replay, SAML      
Message replay, security provisioning patterns      
Message Routers      
Message-handler chain strategy      
MessageDigest class      
MessageDigest class, JCA      
MessageDigest class, Secure Logger pattern      
Messages and message-level security      
Messages and message-level security in case study      2nd
Messages and message-level security in use cases      
Messages and message-level security, encryption      
Messages and message-level security, PasswordSyncListener      
Messages and message-level security, SAML      
Messages and message-level security, SAML for password authentication      
Messages and message-level security, SAML, protocols for      
Messages and message-level security, translation      
Messages and message-level security, validation abuses      
Messages and message-level security, Web services      2nd 3rd
Meta-data and schemas      2nd
Methodology choices in use cases      
Methods, Java      
Microprocessor cards      
MIDlets      
MIDlets, components of      
MIDlets, signed      
MIDlets, trusted      
MIDP (Mobile Information Device Profile)      
Migration      
Migration in Message Interceptor Gateway pattern      
Migration, SAML 1.1 to SAML 2.0      
Mimic scanner attacks      
Minimization and hardening in Web services patterns      
Minutiae-based fingerprint matching      
MITM (man-in-the-middle) attacks      
MITM (man-in-the-middle) attacks in case study      
MITM (man-in-the-middle) attacks in SAML      
MITM (man-in-the-middle) attacks in Web services      
Mobile Information Device Profile (MIDP)      
Model MBean strategy      
Model-View-Controller (MVC) architecture      
Model-View-Controller (MVC) architecture, Authentication Enforcer pattern      
Model-View-Controller (MVC) architecture, Intercepting Validator pattern      
Model-View-Controller (MVC) architecture, Secure Base Action pattern      
Models      
Models, biometrics      
Models, conceptual      
Models, data      
Models, domain      
Models, JWS security      
Models, smart cards      
Models, threat      
Models, trust      2nd 3rd
Models, user account provisioning      2nd
Models, Web services      
Modification attacks      
Modification attacks, SAML      
Modification attacks, Secure Logger pattern      2nd
Modify operations in SPML      
ModifyResponse message      
Modularity      
Modularity, Message Inspector pattern      
Modularity, Message Interceptor Gateway pattern      
Modularity, Secure Message Router pattern      
Monitoring      
Monitoring in case study      
Monitoring, biometrics      
Monitoring, Business tier patterns      
Monitoring, Secure UP      2nd
Monitoring, Security Services      
Monitoring, user account provisioning      
Monitoring, Web services patterns      
Monitoring, Web tier patterns      
Multi service controller      
Multi-factor and multi-tiered authentication      
Multi-factor and multi-tiered authentication, Liberty Alliance sessions      
Multi-factor and multi-tiered authentication, using smart cards and biometrics      
Multiple circles of trust      
Multiple login attempts      
Multiple resource profiles      
Multiple sign-ons      2nd
Multithreading strategy      
Mutual authentication      
Mutual authentication, J2EE      
Mutual authentication, JSSE      
Mutual authentication, Web tier patterns      
MVC (Model-View-Controller) architecture      
MVC (Model-View-Controller) architecture, Authentication Enforcer pattern      
MVC (Model-View-Controller) architecture, Intercepting Validator pattern      
MVC (Model-View-Controller) architecture, Secure Base Action pattern      
MyJAASAux.policy file      
MyPrivilegedAction.java file      
MySSLClient.java program      
MySSLServer.java program      
MyTestAction.java program      
MyTestLoginModule class      
Name Identifier Management Profile      
Name-value (NV) pairs      
Names      [See Identity management]
Namespaces in WS-Security      
Naming service restrictions      
Native code, Java      
Negotiations in WS-Policy      
Network appliance strategy      
Network identity      
Network perimeter security      
Network perimeter security in case study      2nd
Network perimeter security, Web Services      2nd
Network policies      
Network responsiveness      
network services      
Network topology in J2EE      
Network topology in J2EE, horizontal scalability      
Network topology in J2EE, vertical scalability      
Network-Layer security      
Nodes, attack tree      
Non-blocking I/O      
Non-HTTP packets in Web tier patterns      
non-repudiation      2nd
Notice of security breach requirements      
Notification messages      
NV (name-value) pairs      
OASIS standards      
OASIS standards in identity management      
OASIS standards, OASIS Web services      [See WS-Security]
OASIS standards, XCBF      
Obfuscated Transfer Object pattern      
Obfuscated Transfer Object pattern in case study      2nd 3rd 4th
Obfuscated Transfer Object pattern, consequences      
Obfuscated Transfer Object pattern, forces      
Obfuscated Transfer Object pattern, participants and responsibilities      
Obfuscated Transfer Object pattern, problem      
Obfuscated Transfer Object pattern, reality check      
Obfuscated Transfer Object pattern, related patterns      
Obfuscated Transfer Object pattern, sample code      
Obfuscated Transfer Object pattern, security factors and risks      
Obfuscated Transfer Object pattern, solution      
Obfuscated Transfer Object pattern, strategies      
Obfuscated Transfer Object pattern, structure      
Obfuscation      
Obfuscation in case study      2nd
Obfuscation, Business tier patterns      
Obfuscation, Java code      
Obfuscation, Web tier patterns      
Obj.conf file      
Object Name Service (ONS)      
Objects in case study      
OCF (OpenCard Framework)      
OCSP (Online Certificate Status Protocol)      2nd 3rd
ODRL (Open Digital Rights Language)      
One-to-many/one-to-one Policy Delegate      
One-way hash function algorithms      
Oneshot MIDlets      
onFault method      
Online Certificate Status Protocol (OCSP)      2nd 3rd
Online portals      2nd
onMessage method      
onMessage method, AuditRequestMessageBean      
onMessage method, PasswordSyncLedger      
onMessage method, PasswordSyncListener      
ONS (Object Name Service)      
Open Content model      
Open Digital Rights Language (ODRL)      
OpenCard Framework (OCF)      
OpenSC framework      
Operating systems      2nd
Operational models      
Operational models, biometrics      
Operational models, smart cards      
Operational models, Web services      
Operational practices      
Operations      
Operations, Secure UP      
Operations, SPML      
Optical scanners      
Optimization      
Optional flag      
Orders in case study      
Orders in case study, fulfillment      2nd
Orders in case study, management      
Orders in case study, placement      
Origin host verification      
OS (operating systems)      2nd
Output sanitation      
Over-The-Air (OTA) provisioning techniques      
Overflow, buffer      
Padding in JCE block ciphers      
paint method      
PAM (Pluggable Authentication Module)      2nd
PAM (Pluggable Authentication Module) for biometrics      
PAM (Pluggable Authentication Module) for smart cards      
PAPs (Policy Administration Points)      2nd
ParamValidator class      
Parlay Group      2nd
Partial content of XML documents, accessing      
Participants and responsibilities in security patterns      
Participants and responsibilities in security patterns, Assertion Builder      
Participants and responsibilities in security patterns, Audit Interceptor      
Participants and responsibilities in security patterns, Authentication Enforcer      
Participants and responsibilities in security patterns, Authorization Enforcer      
Participants and responsibilities in security patterns, Container Managed Security      
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте