Security for Service Oriented Architectures

Book description

This book examines application and security architectures, and illustrates the relationship between the two. Supplying guidance through the design of distributed and resilient applications, it gives an overview of the standards that service oriented and distributed applications leverage to provide the understanding to make decisions on design.

Table of contents

  1. Front Cover
  2. Contents
  3. Preface
  4. In Gratitude
  5. 1. Introduction
  6. 2. Four Kinds of Architectures (1/13)
  7. 2. Four Kinds of Architectures (2/13)
  8. 2. Four Kinds of Architectures (3/13)
  9. 2. Four Kinds of Architectures (4/13)
  10. 2. Four Kinds of Architectures (5/13)
  11. 2. Four Kinds of Architectures (6/13)
  12. 2. Four Kinds of Architectures (7/13)
  13. 2. Four Kinds of Architectures (8/13)
  14. 2. Four Kinds of Architectures (9/13)
  15. 2. Four Kinds of Architectures (10/13)
  16. 2. Four Kinds of Architectures (11/13)
  17. 2. Four Kinds of Architectures (12/13)
  18. 2. Four Kinds of Architectures (13/13)
  19. 3. Implementing and Securing SOA (1/37)
  20. 3. Implementing and Securing SOA (2/37)
  21. 3. Implementing and Securing SOA (3/37)
  22. 3. Implementing and Securing SOA (4/37)
  23. 3. Implementing and Securing SOA (5/37)
  24. 3. Implementing and Securing SOA (6/37)
  25. 3. Implementing and Securing SOA (7/37)
  26. 3. Implementing and Securing SOA (8/37)
  27. 3. Implementing and Securing SOA (9/37)
  28. 3. Implementing and Securing SOA (10/37)
  29. 3. Implementing and Securing SOA (11/37)
  30. 3. Implementing and Securing SOA (12/37)
  31. 3. Implementing and Securing SOA (13/37)
  32. 3. Implementing and Securing SOA (14/37)
  33. 3. Implementing and Securing SOA (15/37)
  34. 3. Implementing and Securing SOA (16/37)
  35. 3. Implementing and Securing SOA (17/37)
  36. 3. Implementing and Securing SOA (18/37)
  37. 3. Implementing and Securing SOA (19/37)
  38. 3. Implementing and Securing SOA (20/37)
  39. 3. Implementing and Securing SOA (21/37)
  40. 3. Implementing and Securing SOA (22/37)
  41. 3. Implementing and Securing SOA (23/37)
  42. 3. Implementing and Securing SOA (24/37)
  43. 3. Implementing and Securing SOA (25/37)
  44. 3. Implementing and Securing SOA (26/37)
  45. 3. Implementing and Securing SOA (27/37)
  46. 3. Implementing and Securing SOA (28/37)
  47. 3. Implementing and Securing SOA (29/37)
  48. 3. Implementing and Securing SOA (30/37)
  49. 3. Implementing and Securing SOA (31/37)
  50. 3. Implementing and Securing SOA (32/37)
  51. 3. Implementing and Securing SOA (33/37)
  52. 3. Implementing and Securing SOA (34/37)
  53. 3. Implementing and Securing SOA (35/37)
  54. 3. Implementing and Securing SOA (36/37)
  55. 3. Implementing and Securing SOA (37/37)
  56. 4. Web 2.0
  57. 5. Other SOA Platforms (1/4)
  58. 5. Other SOA Platforms (2/4)
  59. 5. Other SOA Platforms (3/4)
  60. 5. Other SOA Platforms (4/4)
  61. 6. Auditing Service-Oriented Architectures (1/4)
  62. 6. Auditing Service-Oriented Architectures (2/4)
  63. 6. Auditing Service-Oriented Architectures (3/4)
  64. 6. Auditing Service-Oriented Architectures (4/4)
  65. 7. Defending and Detecting Attacks (1/2)
  66. 7. Defending and Detecting Attacks (2/2)
  67. 8. Architecture (1/4)
  68. 8. Architecture (2/4)
  69. 8. Architecture (3/4)
  70. 8. Architecture (4/4)
  71. Bibliography (1/2)
  72. Bibliography (2/2)

Product information

  • Title: Security for Service Oriented Architectures
  • Author(s): Walter Williams
  • Release date: April 2014
  • Publisher(s): Auerbach Publications
  • ISBN: 9781466584044