Flylib.com
Enterprise Javaв„ў Security: Building Secure J2EEв„ў Applications
Enterprise Javaв„ў Security: Building Secure J2EEв„ў Applications
ISBN: 0321118898
EAN: 2147483647
Year: 2004
Pages: 164
Authors:
Marco Pistoia
,
Nataraj Nagaratnam
,
Larry Koved
,
Anthony Nadalin
BUY ON AMAZON
Enterprise Java Security: Building Secure J2EE Applications
Table of Contents
Copyright
Foreword
Preface
About the Authors
Part I: Enterprise Security and Java
Chapter 1. An Overview of Java Technology and Security
1.1 Why Java Technology for Enterprise Applications?
1.2 Enterprise Java Technology
1.3 Java Technology as Part of Security
1.4 An Overview of Enterprise Security Integration
1.5 Time to Market
Chapter 2. Enterprise Network Security and Java Technology
2.1 Networked Architectures
2.2 Network Security
2.3 Server-Side Java Technology
2.4 Java and Firewalls
2.5 Summary
Part II: Enterprise Java Components Security
Chapter 3. Enterprise Java Security Fundamentals
3.1 Enterprise Systems
3.2 J2EE Applications
3.3 Secure Interoperability between ORBs
3.4 Connectors
3.5 JMS
3.6 Simple E-Business Request Flow
3.7 J2EE Platform Roles
3.8 J2EE Security Roles
3.9 Declarative Security Policies
3.10 Programmatic Security
3.11 Secure Communication within a WAS Environment
3.12 Secure E-Business Request Flow
Chapter 4. Servlet and JSP Security
4.1 Introduction
4.2 Advantages of Servlets
4.3 Servlet Life Cycle
4.4 The Deployment Descriptor of a Web Module
4.5 Authentication
4.6 Authorization
4.7 Principal Delegation
4.8 Programmatic Security
4.9 Runtime Restrictions for Web Components
4.10 Usage Patterns
4.11 Partitioning Web Applications
Chapter 5. EJB Security
5.1 Introduction
5.2 EJB Roles and Security
5.3 Authentication
5.4 Authorization
5.5 Delegation
5.6 Security Considerations
Chapter 6. Enterprise Java Security Deployment Scenarios
6.1 Planning a Secure-Component System
6.2 Deployment Topologies
6.3 Secure Communication Channel
6.4 Security Considerations
Part III: The Foundations of Java 2 Security
Chapter 7. J2SE Security Fundamentals
7.1 Access to Classes, Interfaces, Fields, and Methods
7.2 Class Loaders
7.3 The Class File Verifier
7.4 The Security Manager
7.5 Interdependence of the Three Java Security Legs
7.6 Summary
Chapter 8. The Java 2 Permission Model
8.1 Overview of the Java 2 Access-Control Model
8.2 Java Permissions
8.3 Java Security Policy
8.4 The Concept of CodeSource
8.5 ProtectionDomains
8.6 The Basic Java 2 Access-Control Model
8.7 Privileged Java 2 Code
8.8 ProtectionDomain Inheritance
8.9 Performance Issues in the Java 2 Access-Control Model
8.10 Summary
Chapter 9. Authentication and Authorization with JAAS
9.1 Overview of JAAS and JAAS Terminology
9.2 Authentication
9.3 Authorization Overview
9.4 JAAS and J2EE
9.5 Additional Support for Pluggable Authentication
Part IV: Enterprise Java and Cryptography
Chapter 10. The Theory of Cryptography
10.1 The Purpose of Cryptography
10.2 Secret-Key Cryptography
10.3 Public-Key Cryptography
Chapter 11. The Java 2 Platform and Cryptography
11.1 The JCA and JCE Frameworks
11.2 The JCA API
11.3 The JCE API
11.4 JCE in Practice
11.5 Security Considerations
Chapter 12. PKCS and SMIME in J2EE
12.1 PKCS Overview
12.2 SMIME Overview
12.3 Signing and Verifying Transactions with PKCS and SMIME
12.4 Encrypting Transactions with PKCS and SMIME
12.5 Security Considerations
12.6 Future Directions
Chapter 13. The SSL and TLS Protocols in a J2EE Environment
13.1 The SSL and TLS Protocols
13.2 HTTPS
13.3 Using the SSL Support Built into J2EE Products
13.4 Using SSL from within J2EE Programs
13.5 Examples
13.6 Summary
Part V: Advanced Topics
Chapter 14. Enterprise Security for Web Services
14.1 XML
14.2 SOAP
14.3 WSDL
14.4 Security for Web Services: Motivations
14.5 Security Technologies
14.6 Web Services Security Model Principles
14.7 Application Patterns
14.8 Use Scenario
14.9 Web Services Provider Security
14.10 Security Considerations
14.11 Futures
Chapter 15. Security Considerations for Container Providers
15.1 Understanding the Environment
15.2 Authentication
15.3 Authorization
15.4 Secure Communication
15.5 Secure Association
15.6 Access to System Resources
15.7 Mapping Identities at Connector Boundaries
Chapter 16. Epilogue
Part VI: Appendixes
Appendix A. Security of Distributed Object Architectures
A.1 RMI
A.2 Stubs and Skeletons
A.3 RMI Registry
A.4 The Security of RMI
Appendix B. X.509 Digital Certificates
B.1 X.509 Certificate Versions
Appendix C. Technical Acronyms Used in This Book
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Appendix D. Sources Used in This Book
Enterprise Javaв„ў Security: Building Secure J2EEв„ў Applications
ISBN: 0321118898
EAN: 2147483647
Year: 2004
Pages: 164
Authors:
Marco Pistoia
,
Nataraj Nagaratnam
,
Larry Koved
,
Anthony Nadalin
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
System Calls
Process Memory
Key Terms and Concepts
Shared Memory Class
Transforming a Local Function Call into a Remote Procedure
CISSP Exam Cram 2
LAW, INVESTIGATIONS, AND ETHICS
CRYPTOGRAPHY
Requirements for New Site Locations
Exam Prep Questions
Cryptographic Services
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Planning for Risk Management
Identifying Project Scope Risk
Managing Project Constraints and Documenting Risks
Managing Activity Risks
Quantifying and Analyzing Project Risk
Oracle Developer Forms Techniques
Special Tips for Working with Multi-form Applications
An Exclusive Server-Side Commit from Forms
Handling Errors
Summary
Planting and Growing Trees -Dynamically Adding Nodes Along with Data to an Existing Base Tree
Java for RPG Programmers, 2nd Edition
String Manipulation
Date And Time Manipulation
An Object Orientation
Threads
Appendix A Using Java on the AS/400
User Interfaces in C#: Windows Forms and Custom Controls
Designing with Classes and Tiers
Classic Controls
Forms
Design-Time Support for Custom Controls
Help and Application-Embedded Support
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies