Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management

Buy
Core Security Patterns is the hands-on practitioner™s guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. Written by three leading Java security architects, the patterns-driven approach fully reflects today™s best practices for security in large-scale, industrial-strength applications.

The authors explain the fundamentals of Java application security from the ground up, then introduce a powerful, structured security methodology; a vendor-independent security framework; a detailed assessment checklist; and twenty-three proven security architectural patterns. They walk through several realistic scenarios, covering architecture and implementation and presenting detailed sample code. They demonstrate how to apply cryptographic techniques; obfuscate code; establish secure communication; secure J2ME™ applications; authenticate and authorize users; and fortify Web services, enabling single sign-on, effective identity management, and personal identification using Smart Cards and Biometrics.

Core Security Patterns covers all of the following, and more:

  • What works and what doesn™t: J2EE application-security best practices, and common pitfalls to avoid
  • Implementing key Java platform security features in real-world applications
  • Establishing Web Services security using XML Signature, XML Encryption, WS-Security, XKMS, and WS-I Basic security profile
  • Designing identity management and service provisioning systems using SAML, Liberty, XACML, and SPML
  • Designing secure personal identification solutions using Smart Cards and Biometrics
  • Security design methodology, patterns, best practices, reality checks, defensive strategies, and evaluation checklists
  • End-to-end security architecture case study: architecting, designing, and implementing an end-to-end security solution for large-scale applications

 

About the Author

Christopher Steel, CISSP, ISSAP, is the President and CEO of FortMoon Consulting and was recently the Chief Architect on the U.S. Treasury's Pay.gov project. He has over fifteen years™ experience in distributed enterprise computing with a strong focus on application security, patterns, and methodologies. He presents regularly at local and industry conferences on security-related topics.

Ramesh Nagappan is a Java Technology Architect at Sun Microsystems. With extensive industry experience, he specializes in Java distributed computing and security architectures for mission-critical applications. Previously he coauthored three best-selling books on J2EE, EAI, and Web Services. He is an active contributor to open source applications and industry-standard initiatives, and frequently speaks at industry conferences related to Java, XML, and Security.

Ray Lai, Principal Engineer at Sun Microsystems, has developed and architected enterprise applications and Web services solutions for leading multinational companies ranging from HSBC and Visa to American Express and DHL. He is author of J2EE Platform Web Services (Prentice Hall, 2004).

(HTML tags aren't allowed.)

Historical Dictionary of Ancient Egypt (Historical Dictionaries of Ancient Civilizations and Historical Eras)
Historical Dictionary of Ancient Egypt (Historical Dictionaries of Ancient Civilizations and Historical Eras)
Historical Dictionary of Ancient Egypt was the first volume in the Historical Dictionaries of Ancient Civilizations and Historical Eras series, and now it is the first to be expanded and updated. This is quite fitting because while the Egyptian civilization is not the oldest, it is certainly the grandest. It stands out for the vast area it covered,...
Brain-Computer Interfaces: Applying our Minds to Human-Computer Interaction
Brain-Computer Interfaces: Applying our Minds to Human-Computer Interaction

For generations, humans have fantasized about the ability to create devices that can see into a person’s mind and thoughts, or to communicate and interact with machines through thought alone. Such ideas have long captured the imagination of humankind in the form of ancient myths and modern science fiction stories. Recent advances in...

Elements of Adaptive Testing (Statistics for Social and Behavioral Sciences)
Elements of Adaptive Testing (Statistics for Social and Behavioral Sciences)

The arrival of the computer in educational and psychological testing has led to the current popularity of adaptive testing---a testing format in which the computer uses statistical information about the test items to automatically adapt their selection to a real-time update of the test taker’s ability estimate. This book covers such key...


How To Do Everything with JavaScript
How To Do Everything with JavaScript

This book is designed to help anyone interested in adding elements of interactivity to their personal
web pages. Some experience with a PC is required, as we will not cover how to access the Internet
or how to use a web browser. You don’t have to be an HTML expert, although it will help if you
have some experience with that
...

Up and Running with Autodesk Inventor Simulation 2011, Second Edition: A step-by-step guide to engineering design solutions
Up and Running with Autodesk Inventor Simulation 2011, Second Edition: A step-by-step guide to engineering design solutions

Autodesk® Inventor® Simulation is an essential element in the Autodesk Digital Prototyping workflow that enables engineers, designers and manufacturers to transition from traditional design and physical prototyping methods to the innovative use of 3D modeling for evaluating form, fit and function. This...

Essential SQLAlchemy
Essential SQLAlchemy

If you’re an application programmer you’ve probably run into a relational database at some point in your professional career. Whether you’re writing enterprise client-server applications or building the next Web 2.0 killer application, you need someplace to put the persistent data for your application, and relational...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy