
Enterprise Web Services Security
Rickland Hollar, Richard Murphy - Collection Networking Security Series
Résumé
Enterprise Web Services Security provides the information developers, application architects, and security professionals need to build security policies and strategies from the ground up in a Web Services environment. Most security books focus on computer, network, or Web Services Security in isolation, relegating the other areas to overview chapters or appendices. This book takes a holistic approach that mirrors the perspective one must have regardless of whether they are planning and implementing the security mechanisms for a Web Service, a Web site, or an enterprise. It details how to secure critical components such as workstations, servers, and networks, the goals behind an enterprise's security policies, the policies an organization should have in place, and how to communicate those policies using WS-Policy Framework and WS-Security Policy. The book also covers various threats and attacks, and the identity management, authentication, authorization, access control, confidentiality, and integrity mechanisms needed to protect messages and transactions, including how to implement and communicate those mechanisms using WS-Security, XML Encryption, XML Signature, SAML, and XACML. The importance of auditing at both the server and network level and how to create trust relationships and domains are also covered. Enterprise Web Services Security explains in detail how to have all your security mechanisms working to successfully thwart attacks and protect assets.
Key Features
- Teaches developers, application architects, and security professionals how to build security policies and strategies from the ground up in a Web Services environment
- Covers the underlying protocols and technologies that form the Internet and the Web (TCP/IP,HTTP) and Web Services (XML, SOAP,WSDL, UDDI), and the major XML and Web Services standards that are the basis of implementing security in a Web Services environment
- Explains how to implement security policies and mechanisms in both the J2EE and .NET environment
- Includes a companion CD-ROM with third-party software, and all of the source code and figures from the book
L'auteur - Rickland Hollar
Rickland Hollar (McLean,VA) is a Senior Applications Architect with the Central Intelligence Agency and has over 30 years experience in the industry. Prior to joining the CIA, he was President of a Virginia based software development firm.He has written articles for various publications, including Web Services Journal.
L'auteur - Richard Murphy
Rick Murphy (Annandale,VA) is a Senior Principal INFOSEC Scientist at Mitretek Systems, a public interest research and development firm.He has over 25 years of experience in the information security field and is an adjunct professor in the University of Virginia's Information Security Management program. Recent publications include papers on open systems security, network firewall configuration, and on access control systems.
Sommaire
- Introduction
- Security in the Networked World
- Threats and Attacks
- Security Goals
- The Internet and World Wide Web Infrastructure
- Web Services
- Security Policy Basics
- Communicating Policy
- Protecting the Physical Components
- Protecting Messages, Transactions, and Data
- Implementing the Information Security Triad
- Communicating Security Credentials
- Audit
- Virtual Domain Model for Web Services Security
- Establishing and Communicating Trust Information
- Pulling it All Together: Using Virtual Trust Domains to Secure Web
- FutureScape
- Appendix A: The Security Policy Document
- Appendix B: About the CD-ROM
- Index
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Charles River Media |
Auteur(s) | Rickland Hollar, Richard Murphy |
Collection | Networking Security Series |
Parution | 17/11/2005 |
Nb. de pages | 408 |
Format | 18,5 x 23,5 |
Couverture | Broché |
Poids | 880g |
Intérieur | Noir et Blanc |
EAN13 | 9781584504139 |
ISBN13 | 978-1-58450-413-9 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Conception et développement web Services Web
- Informatique Informatique d'entreprise Sécurité
- Informatique Développement d'applications Programmation .NET Architecture .NET
- Informatique Développement d'applications Conception et développement web Services Web
- Informatique Développement d'applications Conception et développement web Services Web SOAP
- Informatique Développement d'applications Conception et développement web Services Web WSDL
- Informatique Développement d'applications Langages XML
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Protocoles et standards PKI
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet