Cargando…

Security patterns in practice : designing secure architectures using software patterns /

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Fernandez, Eduardo B., 1936-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Chichester, U.K. : J. Wiley & Sons, ©2013.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn862412155
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 131108s2013 enka ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d YDXCP  |d DEBSZ  |d REB  |d COO  |d VT2  |d EBLCP  |d TEFOD  |d OCLCF  |d TEFOD  |d OCLCQ  |d N$T  |d OCLCQ  |d OCLCO  |d ZCU  |d MERUC  |d OCLCQ  |d CEF  |d DEHBZ  |d ICG  |d OCLCQ  |d WYU  |d CNNOR  |d DKC  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 852758190  |a 961682600  |a 962625842  |a 1055393193  |a 1066419864  |a 1081237155  |a 1103251566  |a 1129357513 
020 |a 9781119970491  |q (electronic bk.) 
020 |a 1119970490  |q (electronic bk.) 
020 |a 9781119970576  |q (electronic bk.) 
020 |a 1119970571  |q (electronic bk.) 
020 |a 9781119970484  |q (electronic bk.) 
020 |a 1119970482  |q (electronic bk.) 
020 |z 1119970482 
020 |z 1119998948 
020 |z 9781119998945 
029 1 |a AU@  |b 000052281492 
029 1 |a CHNEW  |b 000898756 
029 1 |a DEBBG  |b BV041433309 
029 1 |a DEBBG  |b BV044062766 
029 1 |a DEBSZ  |b 39757844X 
029 1 |a DEBSZ  |b 398292981 
029 1 |a DEBSZ  |b 494768541 
029 1 |a NLGGC  |b 431161607 
035 |a (OCoLC)862412155  |z (OCoLC)852758190  |z (OCoLC)961682600  |z (OCoLC)962625842  |z (OCoLC)1055393193  |z (OCoLC)1066419864  |z (OCoLC)1081237155  |z (OCoLC)1103251566  |z (OCoLC)1129357513 
037 |a CL0500000331  |b Safari Books Online 
037 |a C41590ED-46E2-450A-A230-D25BFFBBA123  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.5  |b .F47636349 2013 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Fernandez, Eduardo B.,  |d 1936- 
245 1 0 |a Security patterns in practice :  |b designing secure architectures using software patterns /  |c by Eduardo B. Fernandez. 
260 |a Chichester, U.K. :  |b J. Wiley & Sons,  |c ©2013. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
520 8 |a Annotation  |b Learning to combine security theory and code to produce secure systems Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work. 
505 0 |a Cover; Half Title page; Title page; Copyright page; Dedication; About the Author; About the Foreword Author; Foreword; Preface; Part I: Introduction; Chapter 1: Motivation and Objectives; 1.1 Why Do We Need Security Patterns?; 1.2 Some Basic Definitions; 1.3 The History of Security Patterns; 1.4 Industrial Use of Security Patterns; 1.5 Other Approaches to Building Secure Systems; Chapter 2: Patterns and Security Patterns; 2.1 What is a Security Pattern?; 2.2 The Nature of Security Patterns; 2.3 Pattern Descriptions and Catalogs; 2.4 The Anatomy of a Security Pattern; 2.5 Pattern Diagrams. 
505 8 |a 2.6 How Can We Classify Security Patterns?2.7 Pattern Mining; 2.8 Uses for Security Patterns; 2.9 How to Evaluate Security Patterns and their Effect on Security; 2.10 Threat Modeling and Misuse Patterns; 2.11 Fault Tolerance Patterns; Chapter 3: A Secure Systems Development Methodology; 3.1 Adding Information to Patterns; 3.2 A Lifecyle-Based Methodology; 3.3 Using Model-Driven Engineering; Part II: Patterns; Chapter 4: Patterns for Identity Management; 4.1 Introduction; 4.2 Circle of Trust; 4.3 Identity Provider; 4.4 Identity Federation; 4.5 Liberty Alliance Identity Federation. 
505 8 |a Chapter 5: Patterns for Authentication5.1 Introduction; 5.2 Authenticator; 5.3 Remote Authenticator/Authorizer; 5.4 Credential; Chapter 6: Patterns for Access Control; 6.1 Introduction; 6.2 Authorization; 6.3 Role-Based Access Control; 6.4 Multilevel Security; 6.5 Policy-Based Access Control; 6.6 Access Control List; 6.7 Capability; 6.8 Reified Reference Monitor; 6.9 Controlled Access Session; 6.10 Session-Based Role-Based Access Control; 6.11 Security Logger and Auditor; Chapter 7: Patterns for Secure Process Management; 7.1 Introduction; 7.2 Secure Process/Thread. 
505 8 |a 7.3 Controlled-Process Creator7.4 Controlled-Object Factory; 7.5 Controlled-Object Monitor; 7.6 Protected Entry Points; 7.7 Protection Rings; Chapter 8: Patterns for Secure Execution and File Management; 8.1 Introduction; 8.2 Virtual Address Space Access Control; 8.3 Execution Domain; 8.4 Controlled Execution Domain; 8.5 Virtual Address Space Structure Selection; Chapter 9: Patterns for Secure OS Architecture and Administration; 9.1 Introduction; 9.2 Modular Operating System Architecture; 9.3 Layered Operating System Architecture; 9.4 Microkernel Operating System Architecture. 
505 8 |a 9.5 Virtual Machine Operating System Architecture9.6 Administrator Hierarchy; 9.7 File Access Control; Chapter 10: Security Patterns for Networks; 10.1 Introduction; 10.2 Abstract Virtual Private Network; 10.3 IPSec VPN; 10.4 TLS Virtual Private Network; 10.5 Transport Layer Security; 10.6 Abstract IDS; 10.7 Signature-Based IDS; 10.8 Behavior-Based IDS; Chapter 11: Patterns for Web Services Security; 11.1 Introduction; 11.2 Application Firewall; 11.3 XML Firewall; 11.4 XACML Authorization; 11.5 XACML Access Control Evaluation; 11.6 Web Services Policy Language; 11.7 WS-Policy; 11.8 WS-Trust. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer architecture. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Ordinateurs  |x Architecture. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer architecture.  |2 fast  |0 (OCoLC)fst00872026 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
776 0 8 |i Print version:  |a Fernandez-Buglioni, Eduardo.  |t Security patterns in practice.  |d Chichester : Wiley, 2013  |z 9781119998945  |w (OCoLC)843345763 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119970484/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1245159 
938 |a EBSCOhost  |b EBSC  |n 1102211 
938 |a YBP Library Services  |b YANK  |n 10841102 
994 |a 92  |b IZTAP