Professional Web Services Security / Edition 1

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 96%)
Other sellers (Paperback)
  • All (13) from $1.99   
  • New (1) from $999.11   
  • Used (12) from $1.99   
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any coupons and promotions
Seller since 2008

Feedback rating:



New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.


Ships from: Chicago, IL

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Sort by


Web Services is a new paradigm that has evolved over the years. With successful demonstration of its proof of concept, Web Services are gradually moving towards occupying an important mechanism for e-commerce, because of the industry's awareness of its potential for integration. Security is a not only a prime requirement to implement e-business, but also an important concern due to the fact that Web Services can penetrate through firewalls.

XML based standards have evolved to cater the security needs in Web Services, in addition to the traditional proven techniques. This book presents secure web services for e-commerce along with their implementation details. This book also talks about the evolving standards in Web Services security, and the future directions they are likely to take.

Who is this book for?

This book is for Web Services developers who need real-world practical information on how to make their Web Services fully secure. It is also useful for security analysts who are responsible for the system's integrity.

  • Concepts of Web Services and security
  • Detailed explanation of XML standards that have evolved to meet the security needs
  • Basic concepts of the proven security principles and new challenges faced in the wake of evolving technology
  • Concepts of security at various layers, including transport layer and application layer
  • Practical security aspects of Web Services around .NET and J2EE
  • Available toolkits and SDKs for implementing security in Web Services

About the Author:
Ravi Trivedi is a Software Analyst for Hewlett Packard (HP), Bangalore. He holds a Masters degree in Computer Science from the IndianInstitute of Science (IISc). He is a committer for the open source UDDI4j at and is an expert group member for HP in JAXR (JSR 93). He has been a Team lead for UDDI4j and UDDI Team at HP. Ravi has been involved in developing Web Services infrastructure (UDDI and e-speak) and implemented some of the very first solutions in production using Web Services.

David Whitney is a developer with a major aerospace subsidiary located in Oklahoma City and has been responsible for design, development, and support for numerous projects ranging from engineering analysis, system security, and e-commerce, using languages as old as the "original" FoxBase, and as contemporary as Java, with efforts in C++, Visual Basic, Active Server Pages, Uniface, SQL Server, and others along the way.

Besides being an author on Dotnet technologies, Prasad D V is a Senior Accounting and Audit professional (a qualified Chartered Accountant in India) with twenty three years of experience in the field of Financial Consulting and over six years of progressively responsible experience in the design and development of business applications software. He has expertise in the use of Internet technologies and Client Server Applications with excellent command over Java 2.0, ASP, Visual Interdev 6.0, COM, ADO, VB 6.0/5.0, RDO, IIS 5.0, MS SQL Server 2000, JavaScript, VBScript and .NET Technologies. At and he regularly contributes articles on ASP.NET, Security in Dotnet and Component development.

Murali Janakiraman has been with Rogue Wave for seven years, and is currently the Software Architect for the XML Products team in Corvallis, Oregon. During his tenure at Rogue Wave, Murali has been a developer, senior developer, and Technical lead on almost all of Rogue Wave's database products and XML products. Murali is currently focused on Web Services and related XML technologies. Murali is a member of the W3C XML Protocol working group.

Andre Hiotis is an independent Technical Architect who enjoys working with leading edge technologies and using them to solve practical problems that benefit individuals, organizations, and society. Currently he is using his experience in developing a P2P Network in the fight for Terrorism that makes practical use of the Semantic Web, Security, P2P, and Wireless in solving an information integration problem.

Whitney Hankison is a Systems Analyst with the County of Santa Barbara in Santa Barbara, California, USA. She has authored Professional Windows DNA, and Professional VB.Net 1st and 2nd editions with Wrox Press. Her articles are featured on the WebServicesArchitect site and is featured in the book "Web Services Business Strategies and Architectures" by Expert Press.

Read More Show Less

Product Details

  • ISBN-13: 9781861007650
  • Publisher: Wrox Press, Inc.
  • Publication date: 12/13/2002
  • Series: Professional Ser.
  • Edition number: 1
  • Pages: 575
  • Product dimensions: 7.26 (w) x 9.10 (h) x 1.28 (d)

Table of Contents

Introduction 1
Ch. 1 Web Services 7
Ch. 2 Security 27
Ch. 3 Authentication Mechanisms 61
Ch. 4 PKI 107
Ch. 5 SSL 139
Ch. 6 XML Signature 181
Ch. 7 XML Encryption 223
Ch. 8 XKMS 261
Ch. 9 SAML 303
Ch. 10 XACML 355
Ch. 11 WS-Security 391
Ch. 12 P3P 419
Ch. 13 J2EE Web Services: Case Study 453
Ch. 14 .NET Web Services: Case Study 499
App. A Toolkits 553
App. B Tomcat/Axis Installation 557
App. C Tomcat SSL Configuration 567
Index 571
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)