|
" Enterprise Web services security "
Rickland Hollar, Richard Murphy.
Document Type
|
:
|
BL
|
Record Number
|
:
|
801298
|
Doc. No
|
:
|
b621361
|
Main Entry
|
:
|
Rickland Hollar, Richard Murphy.
|
Title & Author
|
:
|
Enterprise Web services security\ Rickland Hollar, Richard Murphy.
|
Edition Statement
|
:
|
1st ed
|
Publication Statement
|
:
|
Hingham, Mass.: Charles River Media, ©2006.
|
Page. NO
|
:
|
(xxiv, 408 pages) : illustrations
|
ISBN
|
:
|
1584506571
|
|
:
|
: 9781584506577
|
Contents
|
:
|
Contents"; "Introduction"; "1 Security in the Networked World"; "Business on the Internet"; "B2B"; "B2C"; "Evolving Business Models"; "Information Protection"; "Privacy"; "Corporate Confidentiality"; "Legal Obligations"; "Web Services"; "XML"; "SOAP"; "The Messaging Model"; "Security Challenges"; "Threats and Risks"; "Policy"; "Internet"; "Intranet"; "Extranet"; "Wireless"; "Countermeasures"; "WS-* Family of Standards"; "Virtual Domain Model for Web Services Security"; "Security Domains"; "Enclaves"; "Trust Relationships"; "The Model" "Summary""References"; "2 Threats and Attacks"; "Threats, Vulnerabilities, and Countermeasures"; "Ensuring Reliability"; "Vandalism and Sabotage"; "Denial of Service"; "Privacy and Confidentiality Breaches"; "Data Integrity Violations"; "Man-in-the-Middle Attacks"; "Spoofing Attacks"; "Mobile-Code Threats"; "Fraud"; "Special Considerations for Web Services Environments"; "Summary"; "References"; "3 Security Goals"; "Protecting Your Assets"; "Common Security Terms"; "Reducing Vulnerabilities"; "Realistically Assessing Threats" "Choosing the Right Countermeasures""Recognizing and Accepting Residual Risk"; "Classic Security Goals"; "Confidentiality"; "Integrity"; "Availability"; "Transaction Security Goals"; "Authentication"; "Scalability"; "Nonrepudiation"; "The Role of Security Policy in Web Services Security Enforcement"; "Summary"; "References"; "4 The Internet and World Wide Web Infrastructure"; "Internet 101"; "TCP/IP"; "HTTP"; "Security Domains"; "Client System Vulnerabilities"; "Browser Vulnerabilities"; "Java Virtual Machine Vulnerabilities"; "Networks" "TCP/IP Vulnerabilities""HTTP Vulnerabilities"; "SMTP Vulnerabilities"; "Server Vulnerabilities"; "Web Server Vulnerabilities"; "Other Vulnerabilities"; "Summary"; "References"; "5 Web Services"; "Web Services Standards"; "XML"; "Elements and Attributes"; "Namespaces"; "Schemas"; "Transformations"; "SOAP"; "Document Style Messages"; "RPC Style Messages"; "Binding"; "WSDL"; "UDDI"; "Web Services Toolkits"; "Summary"; "References"; "6 Security Policy Basics"; "The Importance of Security Policy"; "Steps in Developing a Security Policy" "Identify the Assets You Are Trying to Protect""Identify the Threats You Are Protecting Against"; "Map Threats to Probability of Loss and Cost"; "Implement Cost-Effective Measures"; "Continuously Review and Improve Security Policies"; "The Security Policy Document"; "Summary"; "References"; "7 Communicating Policy"; "Expressing Security Policy in Web Services"; "WS-Policy"; "Normal Form"; "Compact Form"; "Merging Policies and Resolving Conflicts"; "WS-SecurityPolicy"; "SecurityToken Assertion"; "Confidentiality Assertion"; "Integrity Assertion"
|
Subject
|
:
|
Computer networks -- Security measures.
|
Subject
|
:
|
Web services.
|
Subject
|
:
|
Web sites -- Security measures.
|
LC Classification
|
:
|
TK5105.59R535 2006
|
Added Entry
|
:
|
Richard Murphy
|
|
:
|
Rickland Hollar
|
| |