Book description
Learn to combine security theory and code to produce secure systems
Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work. Written by the authority on security patterns, this unique book examines the structure and purpose of security patterns, illustrating their use with the help of detailed implementation advice, numerous code samples, and descriptions in UML.
Provides an extensive, up-to-date catalog of security patterns
Shares real-world case studies so you can see when and how to use security patterns in practice
Details how to incorporate security from the conceptual stage
Highlights tips on authentication, authorization, role-based access control, firewalls, wireless networks, middleware, VoIP, web services security, and more
Author is well known and highly respected in the field of security and an expert on security patterns
Security Patterns in Practice shows you how to confidently develop a secure system step by step.
Table of contents
- Cover
- Half Title page
- Title page
- Copyright page
- Dedication
- About the Author
- About the Foreword Author
- Foreword
- Preface
-
Part I: Introduction
- Chapter 1: Motivation and Objectives
-
Chapter 2: Patterns and Security Patterns
- 2.1 What is a Security Pattern?
- 2.2 The Nature of Security Patterns
- 2.3 Pattern Descriptions and Catalogs
- 2.4 The Anatomy of a Security Pattern
- 2.5 Pattern Diagrams
- 2.6 How Can We Classify Security Patterns?
- 2.7 Pattern Mining
- 2.8 Uses for Security Patterns
- 2.9 How to Evaluate Security Patterns and their Effect on Security
- 2.10 Threat Modeling and Misuse Patterns
- 2.11 Fault Tolerance Patterns
- Chapter 3: A Secure Systems Development Methodology
-
Part II: Patterns
- Chapter 4: Patterns for Identity Management
- Chapter 5: Patterns for Authentication
- Chapter 6: Patterns for Access Control
- Chapter 7: Patterns for Secure Process Management
- Chapter 8: Patterns for Secure Execution and File Management
- Chapter 9: Patterns for Secure OS Architecture and Administration
- Chapter 10: Security Patterns for Networks
- Chapter 11: Patterns for Web Services Security
- Chapter 12: Patterns for Web Services Cryptography
- Chapter 13: Patterns for Secure Middleware
- Chapter 14: Misuse Patterns
- Chapter 15: Patterns for Cloud Computing Architecture
- Part III: Use of the Patterns
- Appendix A: Pseudocode for XACML Access Control Evaluation
- Glossary
- References
- Index of Patterns
- Index
Product information
- Title: Security Patterns in Practice: Designing Secure Architectures Using Software Patterns
- Author(s):
- Release date: May 2013
- Publisher(s): Wiley
- ISBN: 9781119998945
You might also like
book
Designing Secure Software
Designing Secure Software consolidates Loren Kohnfelder's more than twenty years of experience into a concise, elegant …
book
Authentication and Access Control: Practical Cryptography Methods and Tools
Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication …
book
Building Secure and Reliable Systems
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be …
book
Secure by Design
Secure by Design teaches developers how to use design to drive security in software development. This …