Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Login service in case study      
LoginContext class      
LoginContext class, JAAS authentication      2nd
LoginContext class, JAAS Login Module strategy      2nd
LoginModule class      
LoginModule class, Authentication Enforcer pattern      
LoginModule class, biometrics      
LoginModule class, implementing
LoginModule class, providers for
LoginModule class, smart cards      
LogManager class      
logout method      
logout method, LoginContext
logout method, LoginModule
Logout requests in SAML
Loosely coupled architecture
Loosely coupled architecture, Intercepting Web Agent pattern
Loosely coupled architecture, Secure Service Proxy pattern
Lost smart cards
Low-level KVM security      
MAC (message authentication code)      2nd
Mac class
Magnus.conf file
Maintainability in security patterns
Maintainability in security patterns, Audit Interceptor
Maintainability in security patterns, Intercepting Web Agent      
Maintainability in security patterns, Message Inspector      
Maintainability in security patterns, Message Interceptor Gateway      
Maintainability in security patterns, Secure Message Router      
Malicious code prevention      [See Intercepting Validator pattern]
Man-in-the-middle (MITM) attacks      
Man-in-the-middle (MITM) attacks in case study      
Man-in-the-middle (MITM) attacks in SAML      
Man-in-the-middle (MITM) attacks in Web services
Manageability      
Manageability, J2EE network topology
Manageability, Secure Base Action pattern
Manageability, Secure Logger pattern
manifest files
Manipulation attacks
Mapping
Mapping in Container Managed Security pattern      
Mapping, SAML attributes      
Mapping, user account      
Masked list strategy      
Match-off-the-card strategy      2nd
Match-on-the-card strategy      2nd 3rd
Matrix, Effect      
MBean strategy      
MBeanFactory class      
MBeanFactory.java file      
MBeanManager.java file
MBeanServer class      
MD5 cryptography
MD5 cryptography, Cryptographic Service Providers
MD5 cryptography, JCA message digests
Media in security pattern factor analysis      
Memory      
memory cards      
Memory for Secure Session Object pattern      
Memory in smart cards      
Message authentication code (MAC)      2nd
Message authentication encryption      
Message Configurators      2nd
Message digests      
Message digests, encryption algorithms for      
Message digests, JCA      
Message injection attacks      
Message Inspector pattern      2nd
Message Inspector pattern, consequences      
Message Inspector pattern, forces      
Message Inspector pattern, in case study      2nd 3rd 4th
Message Inspector pattern, participants and responsibilities      
Message Inspector pattern, problem      
Message Inspector pattern, reality checks      
Message Inspector pattern, related patterns
Message Inspector pattern, related patterns, Intercepting Validator
Message Inspector pattern, related patterns, Message Interceptor Gateway      
Message Inspector pattern, related patterns, Secure Message Router
Message Inspector pattern, security factors and risks
Message Inspector pattern, solution      
Message Inspector pattern, strategies
Message Inspector pattern, structure
Message Interceptor Gateway pattern      2nd
Message Interceptor Gateway pattern in case study      2nd 3rd
Message Interceptor Gateway pattern, consequences
Message Interceptor Gateway pattern, forces
Message Interceptor Gateway pattern, participants and responsibilities      
Message Interceptor Gateway pattern, problem
Message Interceptor Gateway pattern, reality check
Message Interceptor Gateway pattern, related patterns
Message Interceptor Gateway pattern, related patterns, Audit Interceptor
Message Interceptor Gateway pattern, related patterns, Intercepting Web Agent
Message Interceptor Gateway pattern, related patterns, Message Inspector      2nd
Message Interceptor Gateway pattern, related patterns, Secure Message Router
Message Interceptor Gateway pattern, security factors and risks
Message Interceptor Gateway pattern, solution
Message Interceptor Gateway pattern, strategies
Message Interceptor Gateway pattern, structure
Message replay
Message replay, SAML
Message replay, security provisioning patterns
Message Routers
Message-handler chain strategy      
MessageDigest class
MessageDigest class, JCA
MessageDigest class, Secure Logger pattern
Messages and message-level security
Messages and message-level security in case study      2nd
Messages and message-level security in use cases
Messages and message-level security, encryption      
Messages and message-level security, PasswordSyncListener
Messages and message-level security, SAML
Messages and message-level security, SAML for password authentication      
Messages and message-level security, SAML, protocols for
Messages and message-level security, translation
Messages and message-level security, validation abuses
Messages and message-level security, Web services      2nd 3rd
Meta-data and schemas      2nd
Methodology choices in use cases
Methods, Java      
Microprocessor cards      
MIDlets      
MIDlets, components of
MIDlets, signed      
MIDlets, trusted
MIDP (Mobile Information Device Profile)
Migration      
Migration in Message Interceptor Gateway pattern
Migration, SAML 1.1 to SAML 2.0
Mimic scanner attacks
Minimization and hardening in Web services patterns
Minutiae-based fingerprint matching      
MITM (man-in-the-middle) attacks
MITM (man-in-the-middle) attacks in case study
MITM (man-in-the-middle) attacks in SAML
MITM (man-in-the-middle) attacks in Web services      
Mobile Information Device Profile (MIDP)
Model MBean strategy
Model-View-Controller (MVC) architecture
Model-View-Controller (MVC) architecture, Authentication Enforcer pattern      
Model-View-Controller (MVC) architecture, Intercepting Validator pattern      
Model-View-Controller (MVC) architecture, Secure Base Action pattern
Models
Models, biometrics
Models, conceptual
Models, data      
Models, domain
Models, JWS security
Models, smart cards      
Models, threat
Models, trust      2nd 3rd
Models, user account provisioning      2nd
Models, Web services
Modification attacks      
Modification attacks, SAML
Modification attacks, Secure Logger pattern      2nd
Modify operations in SPML
ModifyResponse message      
Modularity
Modularity, Message Inspector pattern      
Modularity, Message Interceptor Gateway pattern      
Modularity, Secure Message Router pattern      
Monitoring      
Monitoring in case study      
Monitoring, biometrics
Monitoring, Business tier patterns
Monitoring, Secure UP      2nd
Monitoring, Security Services
Monitoring, user account provisioning
Monitoring, Web services patterns
Monitoring, Web tier patterns
Multi service controller
Multi-factor and multi-tiered authentication
Multi-factor and multi-tiered authentication, Liberty Alliance sessions
Multi-factor and multi-tiered authentication, using smart cards and biometrics
Multiple circles of trust      
Multiple login attempts
Multiple resource profiles      
Multiple sign-ons      2nd
Multithreading strategy      
Mutual authentication      
Mutual authentication, J2EE
Mutual authentication, JSSE      
Mutual authentication, Web tier patterns
MVC (Model-View-Controller) architecture      
MVC (Model-View-Controller) architecture, Authentication Enforcer pattern
MVC (Model-View-Controller) architecture, Intercepting Validator pattern
MVC (Model-View-Controller) architecture, Secure Base Action pattern      
MyJAASAux.policy file      
MyPrivilegedAction.java file
MySSLClient.java program      
MySSLServer.java program
MyTestAction.java program      
MyTestLoginModule class
Name Identifier Management Profile
Name-value (NV) pairs
Names      [See Identity management]
Namespaces in WS-Security      
Naming service restrictions
Native code, Java      
Negotiations in WS-Policy      
Network appliance strategy      
Network identity      
Network perimeter security      
Network perimeter security in case study      2nd
Network perimeter security, Web Services      2nd
Network policies      
Network responsiveness      
network services      
Network topology in J2EE      
Network topology in J2EE, horizontal scalability
Network topology in J2EE, vertical scalability      
Network-Layer security      
Nodes, attack tree      
Non-blocking I/O      
Non-HTTP packets in Web tier patterns      
non-repudiation      2nd
Notice of security breach requirements      
Notification messages      
NV (name-value) pairs      
OASIS standards      
OASIS standards in identity management      
OASIS standards, OASIS Web services      [See WS-Security]
OASIS standards, XCBF      
Obfuscated Transfer Object pattern      
Obfuscated Transfer Object pattern in case study      2nd 3rd 4th
Obfuscated Transfer Object pattern, consequences      
Obfuscated Transfer Object pattern, forces
Obfuscated Transfer Object pattern, participants and responsibilities      
Obfuscated Transfer Object pattern, problem      
Obfuscated Transfer Object pattern, reality check      
Obfuscated Transfer Object pattern, related patterns      
Obfuscated Transfer Object pattern, sample code      
Obfuscated Transfer Object pattern, security factors and risks
Obfuscated Transfer Object pattern, solution      
Obfuscated Transfer Object pattern, strategies
Obfuscated Transfer Object pattern, structure      
Obfuscation      
Obfuscation in case study      2nd
Obfuscation, Business tier patterns      
Obfuscation, Java code      
Obfuscation, Web tier patterns      
Obj.conf file      
Object Name Service (ONS)      
Objects in case study
OCF (OpenCard Framework)
OCSP (Online Certificate Status Protocol)      2nd 3rd
ODRL (Open Digital Rights Language)      
One-to-many/one-to-one Policy Delegate      
One-way hash function algorithms      
Oneshot MIDlets      
onFault method      
Online Certificate Status Protocol (OCSP)      2nd 3rd
Online portals      2nd
onMessage method      
onMessage method, AuditRequestMessageBean      
onMessage method, PasswordSyncLedger      
onMessage method, PasswordSyncListener      
ONS (Object Name Service)      
Open Content model      
Open Digital Rights Language (ODRL)      
OpenCard Framework (OCF)      
OpenSC framework      
Operating systems      2nd
Operational models      
Operational models, biometrics      
Operational models, smart cards      
Operational models, Web services      
Operational practices      
Operations      
Operations, Secure UP      
Operations, SPML      
Optical scanners      
Optimization      
Optional flag      
Orders in case study      
Orders in case study, fulfillment      2nd
Orders in case study, management      
Orders in case study, placement      
Origin host verification      
OS (operating systems)      2nd
Output sanitation      
Over-The-Air (OTA) provisioning techniques      
Overflow, buffer      
Padding in JCE block ciphers      
paint method      
PAM (Pluggable Authentication Module)      2nd
PAM (Pluggable Authentication Module) for biometrics      
PAM (Pluggable Authentication Module) for smart cards      
PAPs (Policy Administration Points)      2nd
ParamValidator class      
Parlay Group      2nd
Partial content of XML documents, accessing      
Participants and responsibilities in security patterns      
Participants and responsibilities in security patterns, Assertion Builder      
Participants and responsibilities in security patterns, Audit Interceptor      
Participants and responsibilities in security patterns, Authentication Enforcer      
Participants and responsibilities in security patterns, Authorization Enforcer      
Participants and responsibilities in security patterns, Container Managed Security      
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2025
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте