Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Name Identifier Management Profile

Name-value (NV) pairs

Names. [See Identity management]

Namespaces in WS-Security

Naming service restrictions

Native code, Java

Negotiations in WS-Policy

Network appliance strategy

Network identity

Network perimeter security

     in case study 2nd

     Web Services 2nd

Network policies

Network responsiveness

Network services

Network topology in J2EE

     horizontal scalability

     vertical scalability

Network-Layer security

Nodes, attack tree

Non-blocking I/O

Non-HTTP packets in Web tier patterns

Non-repudiation 2nd

Notice of security breach requirements

Notification messages

NV (name-value) pairs

Категории