Core Security Patterns : Best Practices and Strategies for J2EE(TM), Web Services, and Identity Mana
来源:互联网 发布:pci数据采集卡驱动 编辑:程序博客网 时间:2024/04/30 23:55
Core Security Patterns is the hands-on practitioner™s guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. Written by three leading Java security architects, the patterns-driven approach fully reflects today™s best practices for security in large-scale, industrial-strength applications.
The authors explain the fundamentals of Java application security from the ground up, then introduce a powerful, structured security methodology; a vendor-independent security framework; a detailed assessment checklist; and twenty-three proven security architectural patterns. They walk through several realistic scenarios, covering architecture and implementation and presenting detailed sample code. They demonstrate how to apply cryptographic techniques; obfuscate code; establish secure communication; secure J2ME™ applications; authenticate and authorize users; and fortify Web services, enabling single sign-on, effective identity management, and personal identification using Smart Cards and Biometrics.
Core Security Patterns covers all of the following, and more:* What works and what doesn™t: J2EE application-security best practices, and common pitfalls to avoid
* Implementing key Java platform security features in real-world applications
* Establishing Web Services security using XML Signature, XML Encryption, WS-Security, XKMS, and WS-I Basic security profile
* Designing identity management and service provisioning systems using SAML, Liberty, XACML, and SPML
* Designing secure personal identification solutions using Smart Cards and Biometrics
* Security design methodology, patterns, best practices, reality checks, defensive strategies, and evaluation checklists
* End-to-end security architecture case study: architecting, designing, and implementing an end-to-end security solution for large-scale applications
http://rapidshare.com/files/51380976/0131463071.zip
- Core Security Patterns : Best Practices and Strategies for J2EE(TM), Web Services, and Identity Mana
- Core J2EE patterns: best practices and design strategies
- Java EE and .NET Interoperability: Integration Strategies, Patterns, and Best Practices
- J2EE Best Practices: Java Design Patterns, Automation, and Performance
- Ajax Patterns and Best Practices
- Pro Java™ EE Spring Patterns: Best Practices and Design Strategies Implementing Java EE Patter
- Apache Hadoop: Best Practices and Anti-Patterns
- Broadcasts -----Security considerations and best practices
- [收藏] Best Practices for Hints and Validation in Web Forms
- Web Services Best Practices
- Best Practices and Requirements for OpenSolaris development
- 《Web 2.0 Principles and Best Practices》
- Yahoo Web Performance Best Practices and Rules
- Mastering BEA WebLogic Server: Best Practices for Building and Deploying J2EE Applications
- Application Interoperability: Microsoft .NET and J2EE (Patterns & Practices)
- Designing Web Services with the J2EE(TM) 1.4 Platform: JAX-RPC, SOAP, and XML Technologies
- Best Practices for Enterprise Security
- Web Server Security Best Practices
- 工作
- Practical software testing: a process-oriented approach
- Effective Software Test Automation: Developing an Automated Software Testing Tool
- 我爱软件编程。
- 要QQ的来 6,7位便宜卖了
- Core Security Patterns : Best Practices and Strategies for J2EE(TM), Web Services, and Identity Mana
- 在Eclipse中使用JUnit
- "linux那些事儿" 的地址
- Building J2EE Applications with the Rational Unified Process
- Inside Windows Storage: Server Storage Technologies for Windows Server 2003, Windows 2000 and Beyond
- Microsoft Windows Server 2003 Administrator's Pocket Consultant
- C++ for Business Programmers
- 崭新的开始
- 用 jsp:include 控制动态内容