close menu
Bookswagon-24x7 online bookstore
close menu
My Account
Home > Computing and Information Technology > Computer security > Data encryption > Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management(English)
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management(English)

Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management(English)

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Praise for Core Security Patterns Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in order to meet those requirements. Core Security Patterns addresses both aspects of security and will be a guide to developers everywhere in creating more secure applications. --Whitfield Diffie, inventor of Public-Key Cryptography A comprehensive book on Security Patterns, which are critical for secure programming. --Li Gong, former Chief Java Security Architect, Sun Microsystems, and coauthor of Inside Java 2 Platform Security As developers of existing applications, or future innovators that will drive the next generation of highly distributed applications, the patterns and best practices outlined in this book will be an important asset to your development efforts. --Joe Uniejewski, Chief Technology Officer and Senior Vice President, RSA Security, Inc. This book makes an important case for taking a proactive approach to security rather than relying on the reactive security approach common in the software industry. --Judy Lin, Executive Vice President, VeriSign, Inc. Core Security Patterns provides a comprehensive patterns-driven approach and methodology for effectively incorporating security into your applications. I recommend that every application developer keep a copy of this indispensable security reference by their side. --Bill Hamilton, author of ADO.NET Cookbook, ADO.NET in a Nutshell, and NUnit Pocket Reference As a trusted advisor, this book will serve as a Java developers security handbook, providing applied patterns and design strategies for securing Java applications. --Shaheen Nasirudheen, CISSP,Senior Technology Officer, JPMorgan Chase Like Core J2EE Patterns, this book delivers a proactive and patterns-driven approach for designing end-to-end security in your applications. Leveraging the authors strong security experience, they created a must-have book for any designer/developer looking to create secure applications. --John Crupi, Distinguished Engineer, Sun Microsystems, coauthor of Core J2EE Patterns Core Security Patterns is the hands-on practitioners guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. Written by three leading Java security architects, the patterns-driven approach fully reflects todays best practices for security in large-scale, industrial-strength applications. The authors explain the fundamentals of Java application security from the ground up, then introduce a powerful, structured security methodology; a vendor-independent security framework; a detailed assessment checklist; and twenty-three proven security architectural patterns. They walk through several realistic scenarios, covering architecture and implementation and presenting detailed sample code. They demonstrate how to apply cryptographic techniques; obfuscate code; establish secure communication; secure J2ME™ applications; authenticate and authorize users; and fortify Web services, enabling single sign-on, effective identity management, and personal identification using Smart Cards and Biometrics. Core Security Patterns covers all of the following, and more: What works and what doesnt: J2EE application-security best practices, and common pitfalls to avoid Implementing key Java platform security features in real-world applications Establishing Web Services security using XML Signature, XML Encryption, WS-Security, XKMS, and WS-I Basic security profile Designing identity management and service provisioning systems using SAML, Liberty, XACML, and SPML Designing secure personal identification solutions using Smart Cards and Biometrics Security design methodology, patterns, best practices, reality checks, defensive strategies, and evaluation checklists End-to-end security architecture case study: architecting, designing, and implementing an end-to-end security solution for large-scale applications

Table of Contents:
Foreword by Judy Lin. Foreword by Joe Uniejewski. Preface. Acknowledgments. About the Authors. I. INTRODUCTION. 1. Security by Default.     Business Challenges Around Security     What Are the Weakest Links?     The Impact of Application Security     The Four W's     Strategies for Building Robust Security     Proactive and Reactive Security     The Importance of Security Compliance     The Importance of Identity Management     The Importance of Java Technology     Making Security a "Business Enabler"     Summary     References 2. Basics of Security.     Security Requirements and Goals     The Role of Cryptography in Security     The Role of Secure Sockets Layer (SSL)     The Importance and Role of LDAP in Security     Common Challenges in Cryptography     Threat Modeling     Identity Management     Summary     References II. JAVA SECURITY ARCHITECTURE AND TECHNOLOGIES. 3. The Java 2 Platform Security.     Java Security Architecture     Java Applet Security     Java Web Start Security     Java Security Management Tools     J2ME Security Architecture     Java Card Security Architecture     Securing the Java Code     Summary     References 4. Java Extensible Security Architecture and APIs.     Java Extensible Security Architecture     Java Cryptography Architecture (JCA)     Java Cryptographic Extensions (JCE)     Java Certification Path API (CertPath)     Java Secure Socket Extension (JSSE)     Java Authentication and Authorization Service (JAAS)     Java Generic Secure Services API (JGSS)     Simple Authentication and Security Layer (SASL)     Summary     References 5. J2EE Security Architecture.     J2EE Architecture and Its Logical Tiers     J2EE Security Definitions     J2EE Security Infrastructure     J2EE Container-Based Security     J2EE Component/Tier-Level Security     J2EE Client Security     EJB Tier or Business Component Security     EIS Integration Tier-Overview     J2EE Architecture--Network Topology     J2EE Web Services Security-Overview     Summary     References III. WEB SERVICES SECURITY AND IDENTITY MANAGEMENT. 6. Web Services Security--Standards and Technologies.     Web Services Architecture and Its Building Blocks     Web Services Security--Core Issues     Web Services Security Requirements     Web Services Security Standards     XML Signature     XML Encryption     XML Key Management System (XKMS)     OASIS Web Services Security (WS-Security)     WS-I Basic Security Profile     Java-Based Web Services Security Providers     XML-Aware Security Appliances     Summary     References 7. Identity Management Standards and Technologies.     Identity Management--Core Issues     Understanding Network Identity and Federated Identity     Introduction to SAML     SAML Architecture     SAML Usage Scenarios     The Role of SAML in J2EE-Based Applications and Web Services     Introduction to Liberty Alliance and Their Objectives     Liberty Alliance Architecture     Liberty Usage Scenarios     The Nirvana of Access Control and Policy Management     Introduction to XACML     XACML Data Flow and Architecture     XACML Usage Scenarios     Summary     References IV. SECURITY DESIGN METHODOLOGY, PATTERNS, AND REALITY CHECKS. 8. The Alchemy of Security Design--Methodology, Patterns, and Reality Checks.     The Rationale     Secure UP     Security Patterns     Security Patterns for J2EE, Web Services, Identity Management, and Service Provisioning     Reality Checks     Security Testing     Adopting a Security Framework     Refactoring Security Design     Service Continuity and Recovery     Conclusion     References V. DESIGN STRATEGIES AND BEST PRACTICES. 9. Securing the Web Tier--Design Strategies and Best Practices.     Web-Tier Security Patterns     Best Practices and Pitfalls     References 10. Securing the Business Tier--Design Strategies and Best Practices.     Security Considerations in the Business Tier     Business Tier Security Patterns     Best Practices and Pitfalls     References 11. Securing Web Services--Design Strategies and Best Practices.     Web Services Security Protocols Stack     Web Services Security Infrastructure     Web Services Security Patterns     Best Practices and Pitfalls     Best Practices     References 12. Securing the Identity--Design Strategies and Best Practices.     Identity Management Security Patterns     Best Practices and Pitfalls     References 13. Secure Service Provisioning--Design Strategies and Best Practices.     Business Challenges     User Account Provisioning Architecture     Introduction to SPML     Service Provisioning Security Pattern     Best Practices and Pitfalls     Summary     References VI. PUTTING IT ALL TOGETHER. 14. Building End-to-End Security Architecture--A Case Study.     Overview     Use Case Scenarios     Application Architecture     Security Architecture     Design     Development     Testing     Deployment     Summary     Lessons Learned     Pitfalls     Conclusion     References VII. PERSONAL IDENTIFICATION USING SMART CARDS AND BIOMETRICS. 15. Secure Personal Identification Strategies Using Smart Cards and Biometrics.     Physical and Logical Access Control     Enabling Technologies     Smart Card-Based Identification and Authentication     Biometric Identification and Authentication     Multi-factor Authentication Using Smart Cards and Biometrics     Best Practices and Pitfalls     References Index.  


Best Seller

| | See All


Product Details
  • ISBN-13: 9780131463073
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Prentice Hall
  • Depth: 57
  • Language: English
  • Series Title: English
  • Sub Title: Best Practices and Strategies for J2EE, Web Services, and Identity Management
  • Width: 184 mm
  • ISBN-10: 0131463071
  • Publisher Date: 27 Oct 2005
  • Binding: Hardback
  • Height: 238 mm
  • No of Pages: 1088
  • Spine Width: 59 mm
  • Weight: 1855 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management(English)
Pearson Education (US) -
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management(English)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management(English)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    | | See All


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA