0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Guide to Secure Web Services - Recommendations of the National Institute of Standards and Technology: NIST Special Publication... Guide to Secure Web Services - Recommendations of the National Institute of Standards and Technology: NIST Special Publication 800-95 (Paperback)
Theodore Winograd, Karen Scarfone, Anoop Singhal
R535 Discovery Miles 5 350 Ships in 18 - 22 working days

This publication of the NIST seeks to assist organizations in understanding the challenges in integrating information security practices into SOA design and development based on Web services. This publication also provides practical, real-world guidance on current and emerging standards applicable to Web services, as well as background information on the most common security threats to SOAs based on Web services. This document presents information that is largely independent of particular hardware platforms, operating systems, and applications. Supplementary security mechanisms (i.e., perimeter security appliances) are considered outside the scope of this publication. Interfaces between Web services components and supplementary controls are noted as such throughout this document on a case-by-case basis. The document, while technical in nature, provides the background information to help readers understand the topics that are discussed. The intended audience for this document includes the following: System and software architects and engineers trained in designing, implementing, testing, or evaluating Web services; Software developers experienced in XML, C#, Visual Basic for .NET (VB.NET), C, or Java for Web services; Security architects, engineers, analysts, and secure software developers/integrators; Researchers who are furthering and extending service interfaces and conceptual designs. This document assumes that readers have some minimal Web services expertise. Because of the constantly changing nature of Web services threats and vulnerabilities, readers are expected to take advantage of other resources (including those listed in this document) for more current and detailed information. The practices recommended in this document are designed to help mitigate the risks associated with Web services. They build on and assume the implementation of practices described in other NIST guidelines listed in Appendix F. The remainder of this document is organized into five major sections. Section 2 provides background to Web services and portals and their relationship to security. Section 3 discusses the many relevant Web service security functions and related technology. Section 4 discusses Web portals, the human user's entry point into the SOA based on Web services. Section 5 discusses the challenges associated with secure Web service-enabling of legacy applications. Finally, Section 6 discusses secure implementation tools and technologies. The document also contains several appendices. Appendix A offers discussion of several attacks commonly leveraged against Web services and SOAs. Appendix B provides an overview of Electronic Business eXtensible Markup Language (ebXML), a Web services protocol suite developed by the United Nations Centre for Trade Facilitation and Electronic Business (UN/CEFACT). Appendices C and D contain a glossary and acronym list, respectively. Appendices E and F list print resources and online tools and resources that may be useful references for gaining a better understanding of Web services and SOAs, security concepts and methodologies, and the general relationship between them. Security Division, Information Technology Laboratory, National Institute of Standards and Technology.

Guidelines on Active Content and Mobile Code (Paperback): Wayne a. Jansen, Theodore Winograd, Karen Scarfone Guidelines on Active Content and Mobile Code (Paperback)
Wayne a. Jansen, Theodore Winograd, Karen Scarfone
R402 Discovery Miles 4 020 Ships in 18 - 22 working days

The purpose of this document is to provide an overview of active content and mobile code technologies in use today and offer insights for making informed IT security decisions on their application and treatment. The discussion gives details about the threats, technology risks, and safeguards for end user systems, such as desktops and laptops. Although various end user applications, such as email clients, can involve active content, Web browsers remain the primary vehicle for delivery and are underscored in the discussion. The tenets presented for Web browsers apply equally well to other end user applications and can be inferred directly.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Quotable Guide to Punctuation
Stephen Spector Hardcover R3,280 Discovery Miles 32 800
Numerical Mathematics and Advanced…
Bulent Karasoezen, Murat Manguoglu, … Hardcover R5,270 Discovery Miles 52 700
Good Nutrition - Good Bees
David Aston, Sally Bucknall Hardcover R1,562 Discovery Miles 15 620
Andy the Ant - Have Bees Will Travel
Nancy Blackwell Hardcover R523 Discovery Miles 5 230
Keeping Healthy Honey Bees
David Aston, Sally Bucknall Paperback R498 Discovery Miles 4 980
Holomorphic Morse Inequalities and…
Xiaonan Ma, George Marinescu Hardcover R3,399 Discovery Miles 33 990
Quantitative Tamarkin Theory
Jun Zhang Hardcover R984 Discovery Miles 9 840
Geometric Complex Analysis - In Honor of…
Jisoo Byun, Hong Rae Cho, … Hardcover R4,061 Discovery Miles 40 610
The Role of Mechanics in the Study of…
David J. Steigmann Hardcover R5,075 Discovery Miles 50 750
Beekeeping for All
Abbe Emile Warre Hardcover R688 Discovery Miles 6 880

 

Partners