Security patterns in practice designing secure architectures using software patterns

Learn to combine security theory and code to produce secure systems Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration...

Descripción completa

Detalles Bibliográficos
Otros Autores: Fernandez, Eduardo B., 1936- author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: West Sussex, England : Wiley 2013.
Edición:1st edition
Colección:Wiley software patterns series.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628733706719
Tabla de Contenidos:
  • Part I: Introduction
  • Chapter 1: Motivation and Objectives
  • Chapter 2: Patterns and Security Patterns
  • Chapter 3: A Secure Systems Development Methodology
  • Part II: Patterns
  • Chapter 4: Patterns for Identity Management
  • Chapter 5: Patterns for Authentication
  • Chapter 6: Patterns for Access Control
  • Chapter 7: Patterns for Secure Process Management
  • Chapter 8: Patterns for Secure Execution and File Management
  • Chapter 9: Patterns for Secure OS Architecture and Administration
  • Chapter 10: Security Patterns for Networks
  • Chapter 11: Patterns for Web Services Security
  • Chapter 12: Patterns for Web Services Cryptography
  • Chapter 13: Patterns for Secure Middleware
  • Chapter 14: Misuse Patterns
  • Chapter 15: Patterns for Cloud Computing Architecture
  • Part III: Use of the Patterns
  • Chapter 16: Building Secure Architectures
  • Chapter 17: Summary and the Future of Security Patterns.