Start Over Save to list Export MARC Display MelCat
book jacket

Find in WorldCat
Author Fernandez-Buglioni, Eduardo.
Title Security Patterns in Practice [electronic resource] : Designing Secure Architectures Using Software Patterns.
Publication Info. Hoboken : Wiley, 2013.
Location Call No. Status Notes
 Libraries Electronic Books  ELECTRONIC BOOKS-DDA    AVAIL. ONLINE
Description 1 online resource.
Series Wiley Software Patterns Series.
Note Description based upon print version of record.
Contents Cover; Half Title page; Title page; Copyright page; Dedication; About the Author; About the Foreword Author; Foreword; Preface; Part I: Introduction; Chapter 1: Motivation and Objectives; 1.1 Why Do We Need Security Patterns?; 1.2 Some Basic Definitions; 1.3 The History of Security Patterns; 1.4 Industrial Use of Security Patterns; 1.5 Other Approaches to Building Secure Systems; Chapter 2: Patterns and Security Patterns; 2.1 What is a Security Pattern?; 2.2 The Nature of Security Patterns; 2.3 Pattern Descriptions and Catalogs; 2.4 The Anatomy of a Security Pattern; 2.5 Pattern Diagrams
2.6 How Can We Classify Security Patterns?2.7 Pattern Mining; 2.8 Uses for Security Patterns; 2.9 How to Evaluate Security Patterns and their Effect on Security; 2.10 Threat Modeling and Misuse Patterns; 2.11 Fault Tolerance Patterns; Chapter 3: A Secure Systems Development Methodology; 3.1 Adding Information to Patterns; 3.2 A Lifecyle-Based Methodology; 3.3 Using Model-Driven Engineering; Part II: Patterns; Chapter 4: Patterns for Identity Management; 4.1 Introduction; 4.2 Circle of Trust; 4.3 Identity Provider; 4.4 Identity Federation; 4.5 Liberty Alliance Identity Federation
Chapter 5: Patterns for Authentication5.1 Introduction; 5.2 Authenticator; 5.3 Remote Authenticator/Authorizer; 5.4 Credential; Chapter 6: Patterns for Access Control; 6.1 Introduction; 6.2 Authorization; 6.3 Role-Based Access Control; 6.4 Multilevel Security; 6.5 Policy-Based Access Control; 6.6 Access Control List; 6.7 Capability; 6.8 Reified Reference Monitor; 6.9 Controlled Access Session; 6.10 Session-Based Role-Based Access Control; 6.11 Security Logger and Auditor; Chapter 7: Patterns for Secure Process Management; 7.1 Introduction; 7.2 Secure Process/Thread
7.3 Controlled-Process Creator7.4 Controlled-Object Factory; 7.5 Controlled-Object Monitor; 7.6 Protected Entry Points; 7.7 Protection Rings; Chapter 8: Patterns for Secure Execution and File Management; 8.1 Introduction; 8.2 Virtual Address Space Access Control; 8.3 Execution Domain; 8.4 Controlled Execution Domain; 8.5 Virtual Address Space Structure Selection; Chapter 9: Patterns for Secure OS Architecture and Administration; 9.1 Introduction; 9.2 Modular Operating System Architecture; 9.3 Layered Operating System Architecture; 9.4 Microkernel Operating System Architecture
9.5 Virtual Machine Operating System Architecture9.6 Administrator Hierarchy; 9.7 File Access Control; Chapter 10: Security Patterns for Networks; 10.1 Introduction; 10.2 Abstract Virtual Private Network; 10.3 IPSec VPN; 10.4 TLS Virtual Private Network; 10.5 Transport Layer Security; 10.6 Abstract IDS; 10.7 Signature-Based IDS; 10.8 Behavior-Based IDS; Chapter 11: Patterns for Web Services Security; 11.1 Introduction; 11.2 Application Firewall; 11.3 XML Firewall; 11.4 XACML Authorization; 11.5 XACML Access Control Evaluation; 11.6 Web Services Policy Language; 11.7 WS-Policy; 11.8 WS-Trust
Note 11.9 SAML Assertion
Reproduction Electronic reproduction. Perth, W.A. Available via World Wide Web.
Added Author Ebooks Corporation
Related To Print version: Fernandez-Buglioni, Eduardo Security Patterns in Practice : Designing Secure Architectures Using Software Patterns Hoboken : Wiley,c2013 9781119998945
ISBN 9781119970484
Permanent url for this catalog record: