|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocn694529368 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
101229s2010 enka o 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d N$T
|d OCLCQ
|d OCLCF
|d NLGGC
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d AGLDB
|d U3W
|d OCLCQ
|d VTS
|d NLE
|d OCLCQ
|d UKMGB
|d STF
|d M8D
|d UKAHL
|d HS0
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB6G3977
|2 bnb
|
016 |
7 |
|
|a 018011898
|2 Uk
|
020 |
|
|
|a 9781847199393
|q (electronic bk.)
|
020 |
|
|
|a 1847199399
|q (electronic bk.)
|
029 |
1 |
|
|a DEBBG
|b BV043112352
|
029 |
1 |
|
|a DEBSZ
|b 421657006
|
029 |
1 |
|
|a GBVCP
|b 803446861
|
029 |
1 |
|
|a UKMGB
|b 018011898
|
035 |
|
|
|a (OCoLC)694529368
|
037 |
|
|
|a 9781847199393
|b Packt Publishing Pvt. Ltd
|
050 |
|
4 |
|a TK5105.888
|b .G53 2010eb
|
072 |
|
7 |
|a COM
|x 060160
|2 bisacsh
|
082 |
0 |
4 |
|a 006.7/6
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Kalali, Masoud.
|
245 |
1 |
0 |
|a GlassFish security :
|b secure your GlassFish installation, web applications, EJB applications, applications, EJB applications, application client modules, and web services using Java EE and GlassFish security measures.
|
260 |
|
|
|a Birmingham, U.K. :
|b Packt Pub.,
|c ©2010.
|
300 |
|
|
|a 1 online resource (v, 279 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Copyright; Credits; About the Author; About the Reviewers; Table of Contents; Preface; Chapter 1: Java EE Security Model; Overview of Java EE architecture; Understanding a typical Java EE application; Accessing protected resource inside a Web module; Deployment descriptors; Understanding Java EE security terms; Defining constraints on resources; Authenticating and authorizing users; Adding authentication to a web application; Authorizing using deployment descriptor; Managing session information; Adding transport security; Using programmatic security in web applications
|
505 |
8 |
|
|a Using security annotationsUnderstanding the EJB modules; Securing EJB modules using annotations; Mapping roles to principals and groups; Accessing the security context programmatically; Using EJB interceptors for auditing and security purposes; Enforcing authentication in EJB modules; Understanding the application client module; Declaring security roles in Application level; Summary; Chapter 2: GlassFish Security Realms; Security realms; Authenticating using security realms; Reusing security assets; GlassFish security realms; Administrating security realms; Creating a File realm
|
505 |
8 |
|
|a Creating the JDBC realmUsing the LDAP realm to secure web applications; Downloading and installing OpenDS 2.2; Creating the LDAP realm; Creating the certificate realm; Public key cryptography; Digital signature; Key stores and trust stores; Managing certificates; Creating the Solaris realm; Developing custom realms; Developing the custom realm; Installing and configuring; Adding a custom authentication method to GlassFish; Summary; Chapter 3: Designing and Developing Secure Java EE Applications; Understanding the sample application; Analyzing sample application business logic
|
505 |
8 |
|
|a Implementing the Business and Persistence layersImplementing the Persistence layer; Developing the Presentation layer; Implementing the Conversion GUI; Implementing the Converter servlet; Implementing the authentication frontend; Configuring deployment descriptors; Specifying the security realm; Deploying the application client module in the Application Client Container; Configuring Application Client Container security; Summary; Chapter 4: Securing GlassFish Environment; Securing a host operating system; Defining security at the OS level; Creating the installation directory
|
505 |
8 |
|
|a Creating the GlassFish userLogging in as a GlassFish user; Restricting access to the filesystem; Restricting access to network interfaces; Restricting access to ports; Enforcing storage usage limitation; Implementing restrictions in the application server level; Securing the Java Runtime environment from unprivileged access; Implementing the policy manager; Securing the GlassFish using security manager; Alternative container policy providers; Estimating security risks: Auditing; Enabling the default auditing module; Developing custom auditing modules; Summary; Chapter 5: Securing GlassFish
|
520 |
|
|
|a Secure your GlassFish installation, Web applications, EJB applications, Application Client modules, and Web services.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Web site development.
|
650 |
|
0 |
|a Application software
|x Development.
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
0 |
|a Java (Computer program language)
|
650 |
|
6 |
|a Sites Web
|x Développement.
|
650 |
|
6 |
|a Logiciels d'application
|x Développement.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Java (Langage de programmation)
|
650 |
|
7 |
|a COMPUTERS
|x Web
|x Web Programming.
|2 bisacsh
|
650 |
|
7 |
|a Application software
|x Development
|2 fast
|
650 |
|
7 |
|a Internet
|x Security measures
|2 fast
|
650 |
|
7 |
|a Java (Computer program language)
|2 fast
|
650 |
|
7 |
|a Web site development
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Kalali, Masoud.
|t GlassFish security.
|d Birmingham, U.K. : Packt Publishing, ©2010
|z 9781847199393
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=348455
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26943050
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 348455
|
994 |
|
|
|a 92
|b IZTAP
|