
Core Security Patterns Best Practices and Strategies for J2EE, Web Services, and Identity Management
by Steel, Christopher; Nagappan, Ramesh; Lai, Ray-
This Item Qualifies for Free Shipping!*
*Excludes marketplace orders.
Rent Book
New Book
We're Sorry
Sold Out
Used Book
We're Sorry
Sold Out
eBook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Author Biography
Table of Contents
Foreword | |
Foreword | |
Preface | |
Acknowledgments | |
About the Authors | |
Introduction | |
Security by Default | |
Business Challenges Around Security | |
What Are the Weakest Links? | |
The Impact of Application Security | |
The Four W's | |
Strategies for Building Robust Security | |
Proactive and Reactive Security | |
The Importance of Security Compliance | |
The Importance of Identity Management | |
The Importance of Java Technology | |
Making Security a "Business Enabler" | |
Summary | |
References | |
Basics of Security | |
Security Requirements and Goals | |
The Role of Cryptography in Security | |
The Role of Secure Sockets Layer (SSL) | |
The Importance and Role of LDAP in Security | |
Common Challenges in Cryptography | |
Threat Modeling | |
Identity Management | |
Summary | |
References | |
Java Security Architecture and Technologies | |
The Java 2 Platform Security | |
Java Security Architecture | |
Java Applet Security | |
Java Web Start Security | |
Java Security Management Tools | |
J2ME Security Architecture | |
Java Card Security Architecture | |
Securing the Java Code | |
Summary | |
References | |
Java Extensible Security Architecture and APIs | |
Java Extensible Security Architecture | |
Java Cryptography Architecture (JCA) | |
Java Cryptographic Extensions (JCE) | |
Java Certification Path API (CertPath) | |
Java Secure Socket Extension (JSSE) | |
Java Authentication and Authorization Service (JAAS) | |
Java Generic Secure Services API (JGSS) | |
Simple Authentication and Security Layer (SASL) | |
Summary | |
References | |
J2EE Security Architecture | |
J2EE Architecture and Its Logical Tiers | |
J2EE Security Definitions | |
J2EE Security Infrastructure | |
J2EE Container-Based Security | |
J2EE Component/Tier-Level Security | |
J2EE Client Security | |
EJB Tier or Business Component Security | |
EIS Integration Tier-Overview | |
J2EE Architecture--Network Topology | |
J2EE Web Services Security-Overview | |
Summary | |
References | |
Web Services Security and Identity Management | |
Web Services Security--Standards and Technologies | |
Web Services Architecture and Its Building Blocks | |
Web Services Security--Core Issues | |
Web Services Security Requirements | |
Web Services Security Standards | |
XML Signature | |
XML Encryption | |
XML Key Management System (XKMS) | |
OASIS Web Services Security (WS-Security) | |
WS-I Basic Security Profile | |
Java-Based Web Services Security Providers | |
XML-Aware Security Appliances | |
Summary | |
References | |
Identity Management Standards and Technologies | |
Identity Management--Core Issues | |
Understanding Network Identity and Federated Identity | |
Introduction to SAML | |
SAML Architecture | |
SAML Usage Scenarios | |
The Role of SAML in J2EE-Based Applications and Web Services | |
Introduction to Liberty Alliance and Their Objectives | |
Liberty Alliance Architecture | |
Liberty Usage Scenarios | |
The Nirvana of Access Control and Policy Management | |
Introduction to XACML | |
XACML Data Flow and Architecture | |
XACML Usage Scenarios | |
Summary | |
References | |
Security Design Methodology, Patterns, and Reality Checks | |
The Alchemy of Security Design--Methodology, Patterns, and Reality Checks | |
The Rationale | |
Secure UP | |
Security Patterns | |
Security Patterns for J2EE, Web Services, Identity Management, and Service Provisioning | |
Reality Checks | |
Security Testing | |
Adopting a Security Framework | |
Refactoring Security Design | |
Table of Contents provided by Publisher. All Rights Reserved. |
Excerpts
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.