N



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Name Identifier Management Profile
Name-value (NV) pairs
Names. [See Identity management]
Namespaces in WS-Security
Naming service restrictions
Native code, Java
Negotiations in WS-Policy
Network appliance strategy
Network identity
Network perimeter security
     in case study 2nd
     Web Services 2nd
Network policies
Network responsiveness
Network services
Network topology in J2EE
     horizontal scalability
     vertical scalability
Network-Layer security
Nodes, attack tree
Non-blocking I/O
Non-HTTP packets in Web tier patterns
Non-repudiation 2nd
Notice of security breach requirements
Notification messages
NV (name-value) pairs




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net