Security patterns in practice designing secure architectures using software patterns
Learn to combine security theory and code to produce secure systems Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
West Sussex, England :
Wiley
2013.
|
Edición: | 1st edition |
Colección: | Wiley software patterns series.
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628733706719 |
Tabla de Contenidos:
- Part I: Introduction
- Chapter 1: Motivation and Objectives
- Chapter 2: Patterns and Security Patterns
- Chapter 3: A Secure Systems Development Methodology
- Part II: Patterns
- Chapter 4: Patterns for Identity Management
- Chapter 5: Patterns for Authentication
- Chapter 6: Patterns for Access Control
- Chapter 7: Patterns for Secure Process Management
- Chapter 8: Patterns for Secure Execution and File Management
- Chapter 9: Patterns for Secure OS Architecture and Administration
- Chapter 10: Security Patterns for Networks
- Chapter 11: Patterns for Web Services Security
- Chapter 12: Patterns for Web Services Cryptography
- Chapter 13: Patterns for Secure Middleware
- Chapter 14: Misuse Patterns
- Chapter 15: Patterns for Cloud Computing Architecture
- Part III: Use of the Patterns
- Chapter 16: Building Secure Architectures
- Chapter 17: Summary and the Future of Security Patterns.