Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

HA. [See High availability (HA)]

Hand geometry

handle method

Handlers

Handshake messages

Hardening

     in Web services patterns

     in Web tier security

Hardware acceleration

Hardware cryptographic devices

     Web services patterns

     Web tier patterns

Headers in SOAP messages

Health Insurance Privacy and Portability Act (HIPPA) of 1996

Helper classes

     AuditInterceptor

     EJB

Hierarchical resource profiles

High availability (HA)

     Identity management patterns

     in case study

     in use cases

     J2EE network topology

     Message Interceptor Gateway pattern

     Secure Message Router pattern

HIPPA (Health Insurance Privacy and Portability Act) of 1996

HMAC-MD5 algorithm

Honeypots

Horizontal scaling

     Business tier patterns

     J2EE network topology

Host operating systems

Host security

     in case study

     in Web services patterns

     using JSSE

HostnameVerifier class

Hot Standby pattern

HTTP

     basic authentication 2nd 3rd

     digest authentication

    POST messages

         identity management

         SAML 2nd

         Web tier patterns

     redirection

    sessions

         cookies and URL rewriting in

         in Web tier patterns

HTTPS (HTTP over SSL)

     for Web services

     J2EE 2nd 3rd 4th

HTTPSClientUsingProxyTunnel.java program

HTTPServletRequest objects 2nd

HttpsUrlConnection class

Hub in Security Wheel

Категории