Security Patterns in Practice
- Length: 582 pages
- Edition: 1
- Language: English
- Publisher: Wiley
- Publication Date: 2013-05-28
- ISBN-10: 1119998948
- ISBN-13: 9781119998945
- Sales Rank: #159706 (See Top 100 Books)
Security Patterns in Practice: Designing Secure Architectures Using Software Patterns (Wiley Software Patterns Series)
Learn to combine security theory and code to produce secure systems
Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work. Written by the authority on security patterns, this unique book examines the structure and purpose of security patterns, illustrating their use with the help of detailed implementation advice, numerous code samples, and descriptions in UML.
- Provides an extensive, up-to-date catalog of security patterns
- Shares real-world case studies so you can see when and how to use security patterns in practice
- Details how to incorporate security from the conceptual stage
- Highlights tips on authentication, authorization, role-based access control, firewalls, wireless networks, middleware, VoIP, web services security, and more
- Author is well known and highly respected in the field of security and an expert on security patterns
Security Patterns in Practice shows you how to confidently develop a secure system step by step.
Table of Contents
Part I: Introduction
Chapter 1: Motivation and Objectives
Chapter 2: Patterns and Security Patterns
Chapter 3: A Secure Systems Development Methodology
Part II: Patterns
Chapter 4: Patterns for Identity Management
Chapter 5: Patterns for Authentication
Chapter 6: Patterns for Access Control
Chapter 7: Patterns for Secure Process Management
Chapter 8: Patterns for Secure Execution and File Management
Chapter 9: Patterns for Secure OS Architecture and Administration
Chapter 10: Security Patterns for Networks
Chapter 11: Patterns for Web Services Security
Chapter 12: Patterns for Web Services Cryptography
Chapter 13: Patterns for Secure Middleware
Chapter 14: Misuse Patterns
Chapter 15: Patterns for Cloud Computing Architecture
Part III: Use of the Patterns
Chapter 16: Building Secure Architectures
Chapter 17: Summary and the Future of Security Patterns
Appendix A: Pseudocode for XACML Access Control Evaluation