Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] HA. [See High availability (HA)] Hand geometry handle method Handlers Handshake messages Hardening in Web services patterns in Web tier security Hardware acceleration Hardware cryptographic devices Web services patterns Web tier patterns Headers in SOAP messages Health Insurance Privacy and Portability Act (HIPPA) of 1996 Helper classes AuditInterceptor EJB Hierarchical resource profiles High availability (HA) Identity management patterns in case study in use cases J2EE network topology Message Interceptor Gateway pattern Secure Message Router pattern HIPPA (Health Insurance Privacy and Portability Act) of 1996 HMAC-MD5 algorithm Honeypots Horizontal scaling Business tier patterns J2EE network topology Host operating systems Host security in case study in Web services patterns using JSSE HostnameVerifier class Hot Standby pattern HTTP basic authentication 2nd 3rd digest authentication POST messages identity management SAML 2nd Web tier patterns redirection sessions cookies and URL rewriting in in Web tier patterns HTTPS (HTTP over SSL) for Web services J2EE 2nd 3rd 4th HTTPSClientUsingProxyTunnel.java program HTTPServletRequest objects 2nd HttpsUrlConnection class Hub in Security Wheel |
Категории