Security Patterns in Practice
Designing Secure Architectures Using Software Patterns
Samenvatting
Everything you need to build sophisticated security controls into every phase of your software lifecycle
Into today's world of mobile networking and remote sensing, cloud computing and web interfacing, applications and the networks they run on have never been more complex. Nor have they ever been more vulnerable to attack.
Despite the vast amounts spent each year on system security, the number and scope of attacks on websites and databases worldwide continues to escalate.
Clearly, what's needed is a more systematic approach to security than the piecemeal methodology followed since the early 1990s-a holistic, case-based approach based on best practices and proven solutions to the full array of modern security threats.
Written by one of the world's leading experts on the subject, Security Patterns in Practice supplies you with just such an approach.
With the help of numerous, real-world case studies, author Eduardo B. Fernandez shows you how to incorporate security into every phase of the software lifecycle-from concept to design to implementation and reengineering-using security patterns.
Dr.E.B. Fernandez also supplies you with a vast catalog of up-to-date security patterns-along with detailed implementation advice and description in UML-covering the full range of modern security issues, including:
- Identity management
- Access control
- Network security and web services security
- Cloud computing security
- Authentication
- Process management
- Web services cryptography
- Building secure architectures
'Security Patterns in Practice' arms you with everything you need to confidently develop or reengineer the most secure applications possible, without having to become a security expert.
Specificaties
Inhoudsopgave
Preface
Part 1: Introduction
1. Motivation and objectives
2. Patterns and security patterns
3. A secure system development methodology
Part 2: Patterns
4. Patterns for identity management
5. Patterns for authentication
6. Patterns for Access control
7. Patterns for secure process management
8. Patterns for secure execution and file management
9. Patterns for secure OS Architecture and administration
10. Security Patterns for networks
11. Patterns for web services security
12. Patterns for web services cryptography
13. Patterns for secure middleware
14. Misuse Patterns
15. Patterns for Cloud computing architecture
Part 3: Use of the patterns
16. Building secure architectures
17. Summary and the future of security patterns
Appendix A: Pseudocode for XACML Access Control Evaluation
Glossary
References
Index of patterns
Index
Anderen die dit boek kochten, kochten ook
Net verschenen
Rubrieken
- aanbestedingsrecht
- aansprakelijkheids- en verzekeringsrecht
- accountancy
- algemeen juridisch
- arbeidsrecht
- bank- en effectenrecht
- bestuursrecht
- bouwrecht
- burgerlijk recht en procesrecht
- europees-internationaal recht
- fiscaal recht
- gezondheidsrecht
- insolventierecht
- intellectuele eigendom en ict-recht
- management
- mens en maatschappij
- milieu- en omgevingsrecht
- notarieel recht
- ondernemingsrecht
- pensioenrecht
- personen- en familierecht
- sociale zekerheidsrecht
- staatsrecht
- strafrecht en criminologie
- vastgoed- en huurrecht
- vreemdelingenrecht