Core Security Patterns
Home > Computing and Information Technology > Computer security > Data encryption > Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
24%
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Praise for Core Security Patterns Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in order to meet those requirements. Core Security Patterns addresses both aspects of security and will be a guide to developers everywhere in creating more secure applications. --Whitfield Diffie, inventor of Public-Key Cryptography A comprehensive book on Security Patterns, which are critical for secure programming. --Li Gong, former Chief Java Security Architect, Sun Microsystems, and coauthor of Inside Java 2 Platform Security As developers of existing applications, or future innovators that will drive the next generation of highly distributed applications, the patterns and best practices outlined in this book will be an important asset to your development efforts. --Joe Uniejewski, Chief Technology Officer and Senior Vice President, RSA Security, Inc. This book makes an important case for taking a proactive approach to security rather than relying on the reactive security approach common in the software industry. --Judy Lin, Executive Vice President, VeriSign, Inc. Core Security Patterns provides a comprehensive patterns-driven approach and methodology for effectively incorporating security into your applications. I recommend that every application developer keep a copy of this indispensable security reference by their side. --Bill Hamilton, author of ADO.NET Cookbook, ADO.NET in a Nutshell, and NUnit Pocket Reference As a trusted advisor, this book will serve as a Java developers security handbook, providing applied patterns and design strategies for securing Java applications. --Shaheen Nasirudheen, CISSP,Senior Technology Officer, JPMorgan Chase Like Core J2EE Patterns, this book delivers a proactive and patterns-driven approach for designing end-to-end security in your applications. Leveraging the authors strong security experience, they created a must-have book for any designer/developer looking to create secure applications. --John Crupi, Distinguished Engineer, Sun Microsystems, coauthor of Core J2EE Patterns Core Security Patterns is the hands-on practitioners guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. Written by three leading Java security architects, the patterns-driven approach fully reflects todays best practices for security in large-scale, industrial-strength applications. The authors explain the fundamentals of Java application security from the ground up, then introduce a powerful, structured security methodology; a vendor-independent security framework; a detailed assessment checklist; and twenty-three proven security architectural patterns. They walk through several realistic scenarios, covering architecture and implementation and presenting detailed sample code. They demonstrate how to apply cryptographic techniques; obfuscate code; establish secure communication; secure J2ME™ applications; authenticate and authorize users; and fortify Web services, enabling single sign-on, effective identity management, and personal identification using Smart Cards and Biometrics. Core Security Patterns covers all of the following, and more: What works and what doesnt: J2EE application-security best practices, and common pitfalls to avoid Implementing key Java platform security features in real-world applications Establishing Web Services security using XML Signature, XML Encryption, WS-Security, XKMS, and WS-I Basic security profile Designing identity management and service provisioning systems using SAML, Liberty, XACML, and SPML Designing secure personal identification solutions using Smart Cards and Biometrics Security design methodology, patterns, best practices, reality checks, defensive strategies, and evaluation checklists End-to-end security architecture case study: architecting, designing, and implementing an end-to-end security solution for large-scale applications

Table of Contents:
Foreword by Judy Lin. Foreword by Joe Uniejewski. Preface. Acknowledgments. About the Authors. I. INTRODUCTION. 1. Security by Default. Business Challenges Around Security What Are the Weakest Links? The Impact of Application Security The Four W's Strategies for Building Robust Security Proactive and Reactive Security The Importance of Security Compliance The Importance of Identity Management The Importance of Java Technology Making Security a "Business Enabler" Summary References 2. Basics of Security. Security Requirements and Goals The Role of Cryptography in Security The Role of Secure Sockets Layer (SSL) The Importance and Role of LDAP in Security Common Challenges in Cryptography Threat Modeling Identity Management Summary References II. JAVA SECURITY ARCHITECTURE AND TECHNOLOGIES. 3. The Java 2 Platform Security. Java Security Architecture Java Applet Security Java Web Start Security Java Security Management Tools J2ME Security Architecture Java Card Security Architecture Securing the Java Code Summary References 4. Java Extensible Security Architecture and APIs. Java Extensible Security Architecture Java Cryptography Architecture (JCA) Java Cryptographic Extensions (JCE) Java Certification Path API (CertPath) Java Secure Socket Extension (JSSE) Java Authentication and Authorization Service (JAAS) Java Generic Secure Services API (JGSS) Simple Authentication and Security Layer (SASL) Summary References 5. J2EE Security Architecture. J2EE Architecture and Its Logical Tiers J2EE Security Definitions J2EE Security Infrastructure J2EE Container-Based Security J2EE Component/Tier-Level Security J2EE Client Security EJB Tier or Business Component Security EIS Integration Tier-Overview J2EE Architecture--Network Topology J2EE Web Services Security-Overview Summary References III. WEB SERVICES SECURITY AND IDENTITY MANAGEMENT. 6. Web Services Security--Standards and Technologies. Web Services Architecture and Its Building Blocks Web Services Security--Core Issues Web Services Security Requirements Web Services Security Standards XML Signature XML Encryption XML Key Management System (XKMS) OASIS Web Services Security (WS-Security) WS-I Basic Security Profile Java-Based Web Services Security Providers XML-Aware Security Appliances Summary References 7. Identity Management Standards and Technologies. Identity Management--Core Issues Understanding Network Identity and Federated Identity Introduction to SAML SAML Architecture SAML Usage Scenarios The Role of SAML in J2EE-Based Applications and Web Services Introduction to Liberty Alliance and Their Objectives Liberty Alliance Architecture Liberty Usage Scenarios The Nirvana of Access Control and Policy Management Introduction to XACML XACML Data Flow and Architecture XACML Usage Scenarios Summary References IV. SECURITY DESIGN METHODOLOGY, PATTERNS, AND REALITY CHECKS. 8. The Alchemy of Security Design--Methodology, Patterns, and Reality Checks. The Rationale Secure UP Security Patterns Security Patterns for J2EE, Web Services, Identity Management, and Service Provisioning Reality Checks Security Testing Adopting a Security Framework Refactoring Security Design Service Continuity and Recovery Conclusion References V. DESIGN STRATEGIES AND BEST PRACTICES. 9. Securing the Web Tier--Design Strategies and Best Practices. Web-Tier Security Patterns Best Practices and Pitfalls References 10. Securing the Business Tier--Design Strategies and Best Practices. Security Considerations in the Business Tier Business Tier Security Patterns Best Practices and Pitfalls References 11. Securing Web Services--Design Strategies and Best Practices. Web Services Security Protocols Stack Web Services Security Infrastructure Web Services Security Patterns Best Practices and Pitfalls Best Practices References 12. Securing the Identity--Design Strategies and Best Practices. Identity Management Security Patterns Best Practices and Pitfalls References 13. Secure Service Provisioning--Design Strategies and Best Practices. Business Challenges User Account Provisioning Architecture Introduction to SPML Service Provisioning Security Pattern Best Practices and Pitfalls Summary References VI. PUTTING IT ALL TOGETHER. 14. Building End-to-End Security Architecture--A Case Study. Overview Use Case Scenarios Application Architecture Security Architecture Design Development Testing Deployment Summary Lessons Learned Pitfalls Conclusion References VII. PERSONAL IDENTIFICATION USING SMART CARDS AND BIOMETRICS. 15. Secure Personal Identification Strategies Using Smart Cards and Biometrics. Physical and Logical Access Control Enabling Technologies Smart Card-Based Identification and Authentication Biometric Identification and Authentication Multi-factor Authentication Using Smart Cards and Biometrics Best Practices and Pitfalls References Index.  

About the Author :
Christopher Steele, CISSP, ISSAP, is the President and CEO of FortMoon Consulting and was recently the Chief Architect on the US Treasury's Pay.gov project.  He has over fifteen year's experience in distributed enterprise computing with a strong focus on application security, patterns and methodologies.  He presents regularly at local and industry conferences on security-related topics. With extensive industry experience, he specializes in Java distributed computing and security architecture for mission-critical applications.  Previously he coauthored three best-selling books for J2EE, EAI and Web Services.  He is an active contributor to open source applications and industry-standard initiatives, and frequently speaks at industry conferences related to Java, XML, and Security.  Ray Lai, Principal Engineer at Sun Microsystems, has developed and architected enterprise applications and Web services solutions for leading multinationals companies ranging from HSBC and Visa to American Express and DHL. he is author of J2EE Platform Web Services (Prentice Hall, 2004).


Best Sellers


Product Details
  • ISBN-13: 9780133119763
  • Binding: Paperback
  • Language: English
  • Spine Width: 100 mm
  • Weight: 100 gr
  • ISBN-10: 0133119769
  • Height: 100 mm
  • No of Pages: 1088
  • Sub Title: Best Practices and Strategies for J2EE, Web Services, and Identity Management
  • Width: 100 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
-
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!