What This Book Is AboutWhat This Book Is NotWho Should Read This Book?How This Book Is OrganizedPart I: IntroductionChapter 1: Security by DefaultChapter 2: Basics of SecurityPart II: Java Security Architecture and TechnologiesChapter 3: The Java 2 Platform SecurityChapter 4: Java Extensible Security Architecture and APIsChapter 5: J2EE Security ArchitecturePart III: Web Services Security and Identity ManagementChapter 6: Web Services Security–Standards and TechnologiesChapter 7: Identity Management–Standards and TechnologiesPart IV: Security Design Methodology, Patterns, and Reality ChecksChapter 8: The Alchemy of Security Design–Security Methodology, Patterns, and Reality ChecksPart V: Design Strategies and Best PracticesChapter 9: Securing the Web Tier–Design Strategies and Best PracticesChapter 10: Securing the Business Tier–Design Strategies and Best PracticesChapter 11: Securing Web Services–Design Strategies and Best PracticesChapter 12: Securing the Identity–Design Strategies and Best PracticesChapter 13: Secure Service Provisioning–Design Strategies and Best PracticesPart VI: Putting It All TogetherChapter 14: Building an End-to-End Security Architecture–Case StudyPart VII: Personal Identification Using Smart Cards and BiometricsChapter 15: Secure Personal Identification Using Smart Cards and BiometricsCompanion Web SiteFeedback