A AAT (Application Assembly Tool), absolute links, acceptor, GSS-API, , interaction, implementing, tokens, access controller, , guarded objects, principal-based , signed objects, ACK flag, TCP, ACL (Access Control List), , ACLs (Access Control Lists), activation, EJBs, active attacks, operating systems, addresses, IP addresses, Aggressive mode, key exchange Phase 1, AH (Authentication Header), IPSec, AlgorithmParameterGenerator class, AlgorithmParameters class, , AlgorithmParameterSpec class, algorithms cryptographic algorithms, differential cryptanalysis, DSS, ECDSA, hash algorithms, collision resistance, MD algorithms, implementation, RIPEMD-160, SHA-1 algorithm, MD, breakdown, MDs and, aliases, APIs (Application Program Interfaces), , Java-based, UDDI and, UDDI API, sniffers and, applets, security, Application Component Providers, authentication and, application object access, CORBA, application security, WLS, application-level gateway, firewalls, application-managed resource manage signon, J2EE, application-managed sign-on, databases, AppServer Edition, Borland Enterprise Server, ARP (Address Resolution Protocol), AS (Authentication Server), assurance requirements, CC and, asymmetric ciphers, asymmetric encryption, databases, asymmetric keys, , attacks active, operating systems, denial of service attacks, dictionary attacks, hack attacks active, denial of service attacks, passive, sniffers, types, , weapons against, network attacks, monitoring terms, sniffers, SSL and, viruses, auditing, authentication, Application Component Providers, components , CORBA, credentials, definition, form-based, HMAC, HTTP basic authentication, HTTPS mutual authentication, J2EE components, JAAS, Kerberos and, Kerberos Server, layers , lazy authentication, MAC, mutual, mutual authentication, one-way, PAM, principals, principals and, public key, server challenges, server responses, SSL, stacked , two-phase process, validation and, Web- tier configuration, Authenticator, Authenticator class, authenticator, TGS Service tickets, authorization, components, , CORBA, definition, J2EE components, JAAS, layers, permissions, principals, Java Security Solutions ISBN: 0764549286
EAN: 2147483647 Year: 2001
Pages: 222 Authors: Rich Helton, Johennie Helton
flylib.com © 2008-2017. If you may any questions please contact us: flylib@qtcs.net |