Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SOA Security

Buy
SOA Security, 9781932394689 (1932394680), Manning Publications, 2008
SOA is one of the latest technologies enterprises are using to tame their software costs - in development, deployment, and management. SOA makes integration easy, helping enterprises not only better utilize their existing investments in applications and infrastructure, but also open up new business opportunities. However, one of the big stumbling blocks in executing SOA is security. This book addresses Security in SOA with detailed examples illustrating the theory, industry standards and best practices.

It is true that security is important in any system. SOA brings in additional security concerns as well rising out of the very openness that makes it attractive. If we apply security principles blindly, we shut ourselves of the benefits of SOA. Therefore, we need to understand which security models and techniques are right for SOA. This book provides such an understanding.

Usually, security is seen as an esoteric topic that is better left to experts. While it is true that security requires expert attention, everybody, including software developers, designers, architects, IT administrators and managers need to do tasks that require very good understanding of security topics. Fortunately, traditional security techniques have been around long enough for people to understand and apply them in practice. This, however, is not the case with SOA Security.

Anyone seeking to implement SOA Security is today forced to dig through a maze of inter-dependent specifications and API docs that assume a lot of prior experience on the part of readers. Getting started on a project is hence proving to be a huge challenge to practitioners. This book seeks to change that. It provides bottom-up understanding of security techniques appropriate for use in SOA without assuming any prior familiarity with security topics on the part of the reader.

Unlike most other books about SOA that merely describe the standards, this book helps you get started immediately by walking you through sample code that illustrates how real life problems can be solved using the techniques and best practices described in standards. Whereas standards discuss all possible variations of each security technique, this book focusses on the 20% of variations that are used 80% of the time. This keeps the material covered in the book simple as well as self-sufficient for all readers except the most advanced.

About the Author

Dr. Tamarao (Rama) Kanneganti is Chief Technology Officer (CTO) at HCL EAI Services. Rama has a Ph.D. in programming languages from Rice University and has worked at Bell Labs in databases and large programming systems. Currently, he advises enterprise clients in formulating and evaluating SOA strategies. Rama works out of Grosse Pointe Woods (near Detroit), Michigan, USA.

Prasad A. Chodavarapu is General Manager (Technology) at HCL EAI Services, Bangalore, India. Prasad leads service teams designing and deploying integration solutions at enterprises world-wide. Prasad's current focus is on the use of application-oriented networking technologies to implement and secure SOA.

(HTML tags aren't allowed.)

Intelligent Infrastructures (Intelligent Systems, Control and Automation: Science and Engineering)
Intelligent Infrastructures (Intelligent Systems, Control and Automation: Science and Engineering)

Society heavily depends on infrastructure systems, such as road-traffic networks, water networks, electricity networks, etc. Infrastructure systems are hereby considered to be large-scale, networked systems, that almost everybody uses on a daily basis, and that are so vital that their incapacity or destruction would have a debilitating impact on...

The After Effects Illusionist: All the Effects in One Complete Guide
The After Effects Illusionist: All the Effects in One Complete Guide

Covers CS4
This cookbook contains recipe after recipe that allow you to harness the full power of the native plug-in effects in the After Effects application. In a step-by-step manner, author Chad Perkins guides you through the creation and application of each and every native plug-in effect available for use in the AE toolset.
...

Real World Adobe Illustrator CS2
Real World Adobe Illustrator CS2
How do you define a serious Illustrator user? How about one who uses Illustrator to produce robust and professional-looking vector graphics but also needs the program to be flexible and efficient in  workflow and production cycles. If this describes you or the user you strive to be, then you need this book Filled with the industrial-strength...

Microsoft® .NET Distributed Applications: Integrating XML Web Services and .NET Remoting
Microsoft® .NET Distributed Applications: Integrating XML Web Services and .NET Remoting

Make the jump to distributed application programming using the .NET Framework—and introduce a new level of performance, scalability, and security to your network and enterprise applications. Expert .NET developer Matthew MacDonald shares proven techniques for fully exploiting .NET Remoting, XML Web services, and other...

Passive Components for Circuit Design
Passive Components for Circuit Design

Despite the very considerable increase in the use of ICs over the past ten years, passive components are still the mainstay of the electronics industry. The strong emphasis that is given to semiconductors, and ICs in particular, in teaching courses at all levels, however, causes the subject of passive components to be neglected, and many...

Network Security Architectures
Network Security Architectures

Written by the principal architect of the original Cisco Systems SAFE Security Blueprint, Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. Whether your background is security or networking, you can use this book to learn how to...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy