Description |
xlvi, 1041 pages ; 24 cm |
Series |
Prentice Hall core series |
|
Prentice Hall PTR core series.
|
Contents |
Machine derived contents note: Table of Contents -- Part One: Introduction -- Chapter 1: Security by Default -- Chapter 2: Basics of Security -- Part Two: Java Security Architecture and Technologies -- Chapter 3: The Java 2 Platform Security -- Chapter 4: Java Extensible Security Architecture and APIs -- Chapter 5: J2EE Security Architecture -- Part Three: Web services Security and Identity Management -- Chapter 6: Web Services Security - Standards and Technologies -- Chapter 7: Identity Management - Standards and Technologies -- Part Four: Security Design Methodology, Patterns and Reality checks -- Chapter 8: The Alchemy of Security Design: Security Methodology, Patterns and Reality checks -- Part Five: Design Strategies and Best Practices -- Chapter 9: Securing the Web Tier - Design Strategies and Best practices -- Chapter 10: Securing the Business Tier - Design Strategies and Best practices -- Chapter 11: Securing Web services - Design Strategies and Best practices -- Chapter 12: Securing the Identity - Design Strategies and Best practices -- Chapter 13: Secure Service Provisioning - Design Strategies and Best practices -- Part Six: Putting it all together -- Chapter 14: Building an End-to-End Security Architecture - Case Study -- Part Seven: Personal Identification using smart cards and Biometrics -- Chapter 15: Secure Personal Identification using Smart Cards and Biometrics |
Notes |
Formerly CIP. Uk |
Bibliography |
Includes bibliographical references and index |
Subject |
Computer security.
|
|
Java (Computer program language)
|
Author |
Lai, Ray.
|
|
Nagappan, Ramesh.
|
LC no. |
2005020502 |
ISBN |
0131463071 (hbk.) |
|