Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Name Identifier Management Profile Name-value (NV) pairs Names. [See Identity management] Namespaces in WS-Security Naming service restrictions Native code, Java Negotiations in WS-Policy Network appliance strategy Network identity Network perimeter security in case study 2nd Web Services 2nd Network policies Network responsiveness Network services Network topology in J2EE horizontal scalability vertical scalability Network-Layer security Nodes, attack tree Non-blocking I/O Non-HTTP packets in Web tier patterns Non-repudiation 2nd Notice of security breach requirements Notification messages NV (name-value) pairs |
Категории