Architecting Secure Software Systems
Architecting Secure Software Systems
Click to enlarge
Author(s): Talukder, Asoke
Talukder, Asoke K.
ISBN No.: 9781420087840
Pages: 446
Year: 200812
Format: Trade Cloth (Hard Cover)
Price: $ 213.93
Dispatch delay: Dispatched between 7 to 15 days
Status: Available (On Demand)

Security in Software Systems Need for Computer Security Vulnerability and Attacks Various Security Attacks Computer Security Counter External Threats Security Programming Database Security Common Criteria Security Standards Architecting Secure Software Systems Building Secured System Security Requirements Analysis Threat Modeling Security Design Security Coding Safe Programming Security Review Generating the Executable Security Testing Secured Deployment Security Remediation Security Documentation Security Response Planning Safety-Critical Systems Constructing Secured and Safe C/UNIX Programs UNIX and Linux History UNIX and Linux Security Privileges in UNIX Secure Network Programming UNIX Virtualization UNIX Security Logging C/C++ Language Common Security Problems with C/C++ Avoiding Security Risks with C/C++ Code Some Coding Rules Constructing Secured Systems in NET Overview of .NET 3.0 Common Language Runtime NET Runtime Security NET Security Architecture Identity and Principal Permission Code Access Security Role-Based Security Type Safety and Security ASP.NET Security NET Remoting Security Windows Security Networking and Service-Oriented Architecture-Based Security Networking and Open Systems Interconnection Model Transmission Control Protocol/Internet Protocol Primer Security Using Sockets Service-Oriented Architecture Remote Procedure Call Remote Method Invocation Security Common Object Request Broker Architecture Security Securing ActiveX Control Distributed Component Object Model Security Java Client-Side Security Java Framework Java Platform Security The Java Cryptography Application Programming Interface Java Secure Sockets Extension Authentication and Access Control Java Sandbox Java Applets Security Java Swing Security in Mobile Applications Mobile Computing Networks Next Generation Networks Next Generation Network Security Mobile Applications Security in Mobile Computing Scenario Java 2 Micro Edition Security Java Card and Universal Subscriber Identity Module Security Wireless Application Protocol Security Security Implementation in Windows Mobile Mobile Agents Mobile Ad Hoc Network Security Digital Rights Management Security in Web-Facing Applications Overview of Web Security Identity Management Public Key Infrastructure Trust in Service Emerging Security Technologies Code Injection Parameter Tampering Cross-Site Scripting File Disclosure Next Generation Webs Next Generation Web Security Secured Web Programming Application Vulnerability Description Language Server-Side Java Security Server-Side Java Servlet Security Securing Java Server Pages Java Struts Security Java Server Faces Security Web Application Development Rules Securing Enterprise JavaBeans Constructing Secured Web Services Web Services Security Threat Profile and Risk Analysis Web Service Security Model Web Services Security Standards Servlet Security for Web Services Secure Sockets Layer Security for Web Services WS Security with Apache AXIS XML and XPath Injection Attack Through SOAP-Based Web Services Federated Identity Management and Web Services Security Index mentation Security Response Planning Safety-Critical Systems Constructing Secured and Safe C/UNIX Programs UNIX and Linux History UNIX and Linux Security Privileges in UNIX Secure Network Programming UNIX Virtualization UNIX Security Logging C/C++ Language Common Security Problems with C/C++ Avoiding Security Risks with C/C++ Code Some Coding Rules Constructing Secured Systems in NET Overview of .NET 3.0 Common Language Runtime NET Runtime Security NET Security Architecture Identity and Principal Permission Code Access Security Role-Based Security Type Safety and Security ASP.NET Security NET Remoting Security Windows Security Networking and Service-Oriented Architecture-Based Security Networking and Open Systems Interconnection Model Transmission Control Protocol/Internet Protocol Primer Security Using Sockets Service-Oriented Architecture Remote Procedure Call Remote Method Invocation Security Common Object Request Broker Architecture Security Securing ActiveX Control Distributed Component Object Model Security Java Client-Side Security Java Framework Java Platform Security The Java Cryptography Application Programming Interface Java Secure Sockets Extension Authentication and Access Control Java Sandbox Java Applets Security Java Swing Security in Mobile Applications Mobile Computing Networks Next Generation Networks Next Generation Network Security Mobile Applications Security in Mobile Computing Scenario Java 2 Micro Edition Security Java Card and Universal Subscriber Identity Module Security Wireless Application Protocol Security Security Implementation in Windows Mobile Mobile Agents Mobile Ad Hoc Network Security Digital Rights Management Security in Web-Facing Applications Overview of Web Security Identity Management Public Key Infrastructure Trust in Service Emerging Security Technologies Code Injection Parameter Tampering Cross-Site Scripting File Disclosure Next Generation Webs Next Generation Web Security Secured Web Programming Application Vulnerability Description Language Server-Side Java Security Server-Side Java Servlet Security Securing Java Server Pages Java Struts Security Java Server Faces Security Web Application Development Rules Securing Enterprise JavaBeans Constructing Secured Web Services Web Services Security Threat Profile and Risk Analysis Web Service Security Model Web Services Security Standards Servlet Security for Web Services Secure Sockets Layer Security for Web Services WS Security with Apache AXIS XML and XPath Injection Attack Through SOAP-Based Web Services Federated Identity Management and Web Services Security Index Security Role-Based Security Type Safety and Security ASP.NET Security NET Remoting Security Windows Security Networking and Service-Oriented Architecture-Based Security Networking and Open Systems Interconnection Model Transmission Control Protocol/Internet Protocol Primer Security Using Sockets Service-Oriented Architecture Remote Procedure Call Remote Method Invocation Security Common Object Request Broker Architecture Security Securing ActiveX Control Distributed Component Object Model Security Java Client-Side Security Java Framework Java Platform Security The Java Cryptography Application Programming Interface Java Secure Sockets Extension Authentication and Access Control Java Sandbox Java Applets Security Java Swing Security in Mobile Applications Mobile Computing Networks Next Generation Networks Next Generation Network Security Mobile Applications Security in Mobile Computing Scenario Java 2 Micro Edition Security Java Card and Universal Subscriber Identity Module Security Wireless Application Protocol Security Security Implementation in Windows Mobile Mobile Agents Mobile Ad Hoc Network Security Digital Rights Management Security in Web-Facing Applications Overview of Web Security Identity Management Public Key Infrastructure Trust in Service Emerging Security Technologies Code Injection Parameter Tampering Cross-Site Scripting File Disclosure Next Generation Webs Next Generation Web Security Secured Web Programming Application Vulnerability Description Language Server-Side Java Security Server-Side Java Servlet Security Securing Java Server Pages Java Struts Security Java Server Faces Security Web Application Development Rules Securing Enterprise JavaBeans Constructing Secured Web Services Web Services Security Threat Profile and Risk Analysis Web Service Security Model Web Services Security Standards Servlet Security for Web Services Secure Sockets Layer Security for Web Services WS Security with Apache AXIS XML and XPath Injection Attack Through SOAP-Based Web Services Federated Identity Management and Web Services Security Index t;P>The Java Cryptography Application Programming Interface Java Secure Sockets Extension Authentication and Access Control Java Sandbox Java Applets Security Java Swing Security in Mobile Applications Mobile Computing


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...