- Shopping Bag ( 0 items )
Ships from: Welwyn Garden City, United Kingdom
Usually ships in 1-2 business days
The use of Web Services for Business-to-Business (B2B) and Business-to-Consumer (B2C) transactions has created risks that expose critical assets to increasingly greater threats. Enterprise Web Services Security provides the information developers, application architects, and security professionals need to build security policies and strategies from the ground up in a Web Services environment. Most security books focus on computer or network security in isolation, relegating the other areas to overview chapters or appendices. A single-system view of security, however, is not adequate to describe a distributed Web Services-based environment as it causes the developer to have to piece together material from several resources in order to create secure Web sites and services. This book takes a holistic approach that mirrors the perspective developers need to take regardless of whether they are planning and implementing the security mechanisms for a Web Service, a Web site, or an enterprise. It details how to secure critical components such as workstations, servers, and networks, the goals behind an enterprise's security policies, the policies an organization should have in place, and how to communicate those policies using WS-Policy Framework and WS-Security Policy. Various threats and attacks are also covered, as well as the identity management, authentication, authorization, access control, confidentiality, and integrity mechanisms needed to protect messages and transactions. Enterprise Web Services Security is the one book developers need to make all their security mechanisms work successfully to thwart attacks and protect assets.
Introduction Chapter 1 Security in the Networked World Chapter 2 Threats and Attacks Chapter 3 Security Goals Chapter 4 The Internet and World Wide Web Infrastructure Chapter 5 Web Services Chapter 6 Security Policy Basics Chapter 7 Communicating Policy Chapter 8 Protecting the System Components Chapter 9 Protecting Messages, Transactions, and Data Chapter 10 Implementing the Information Security Triad Chapter 11 Communicating Security Credentials Chapter 12 Audit Chapter 13 Virtual Domain Model for Web Services Security Chapter 14 Establishing and Communicating Trust Chapter 15 Pulling It All Together: Using Virtual Trust Domains to Secure Enterprise Web Services Chapter 16 FutureScape Appendix A The Security Policy Document Appendix B About the CD-ROM Index