H



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

HA. [See High availability (HA)]
Hand geometry
handle method
Handlers
Handshake messages
Hardening
     in Web services patterns
     in Web tier security
Hardware acceleration
Hardware cryptographic devices
     Web services patterns
     Web tier patterns
Headers in SOAP messages
Health Insurance Privacy and Portability Act (HIPPA) of 1996
Helper classes
     AuditInterceptor
     EJB
Hierarchical resource profiles
High availability (HA)
     Identity management patterns
     in case study
     in use cases
     J2EE network topology
     Message Interceptor Gateway pattern
     Secure Message Router pattern
HIPPA (Health Insurance Privacy and Portability Act) of 1996
HMAC-MD5 algorithm
Honeypots
Horizontal scaling
     Business tier patterns
     J2EE network topology
Host operating systems
Host security
     in case study
     in Web services patterns
     using JSSE
HostnameVerifier class
Hot Standby pattern
HTTP
     basic authentication 2nd 3rd
     digest authentication
    POST messages
         identity management
         SAML 2nd
         Web tier patterns
     redirection
    sessions
         cookies and URL rewriting in
         in Web tier patterns
HTTPS (HTTP over SSL)
     for Web services
     J2EE 2nd 3rd 4th
HTTPSClientUsingProxyTunnel.java program
HTTPServletRequest objects 2nd
HttpsUrlConnection class
Hub in Security Wheel




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net