Book description
This book examines application and security architectures, and illustrates the relationship between the two. Supplying guidance through the design of distributed and resilient applications, it gives an overview of the standards that service oriented and distributed applications leverage to provide the understanding to make decisions on design.
Table of contents
- Front Cover
- Contents
- Preface
- In Gratitude
- 1. Introduction
- 2. Four Kinds of Architectures (1/13)
- 2. Four Kinds of Architectures (2/13)
- 2. Four Kinds of Architectures (3/13)
- 2. Four Kinds of Architectures (4/13)
- 2. Four Kinds of Architectures (5/13)
- 2. Four Kinds of Architectures (6/13)
- 2. Four Kinds of Architectures (7/13)
- 2. Four Kinds of Architectures (8/13)
- 2. Four Kinds of Architectures (9/13)
- 2. Four Kinds of Architectures (10/13)
- 2. Four Kinds of Architectures (11/13)
- 2. Four Kinds of Architectures (12/13)
- 2. Four Kinds of Architectures (13/13)
- 3. Implementing and Securing SOA (1/37)
- 3. Implementing and Securing SOA (2/37)
- 3. Implementing and Securing SOA (3/37)
- 3. Implementing and Securing SOA (4/37)
- 3. Implementing and Securing SOA (5/37)
- 3. Implementing and Securing SOA (6/37)
- 3. Implementing and Securing SOA (7/37)
- 3. Implementing and Securing SOA (8/37)
- 3. Implementing and Securing SOA (9/37)
- 3. Implementing and Securing SOA (10/37)
- 3. Implementing and Securing SOA (11/37)
- 3. Implementing and Securing SOA (12/37)
- 3. Implementing and Securing SOA (13/37)
- 3. Implementing and Securing SOA (14/37)
- 3. Implementing and Securing SOA (15/37)
- 3. Implementing and Securing SOA (16/37)
- 3. Implementing and Securing SOA (17/37)
- 3. Implementing and Securing SOA (18/37)
- 3. Implementing and Securing SOA (19/37)
- 3. Implementing and Securing SOA (20/37)
- 3. Implementing and Securing SOA (21/37)
- 3. Implementing and Securing SOA (22/37)
- 3. Implementing and Securing SOA (23/37)
- 3. Implementing and Securing SOA (24/37)
- 3. Implementing and Securing SOA (25/37)
- 3. Implementing and Securing SOA (26/37)
- 3. Implementing and Securing SOA (27/37)
- 3. Implementing and Securing SOA (28/37)
- 3. Implementing and Securing SOA (29/37)
- 3. Implementing and Securing SOA (30/37)
- 3. Implementing and Securing SOA (31/37)
- 3. Implementing and Securing SOA (32/37)
- 3. Implementing and Securing SOA (33/37)
- 3. Implementing and Securing SOA (34/37)
- 3. Implementing and Securing SOA (35/37)
- 3. Implementing and Securing SOA (36/37)
- 3. Implementing and Securing SOA (37/37)
- 4. Web 2.0
- 5. Other SOA Platforms (1/4)
- 5. Other SOA Platforms (2/4)
- 5. Other SOA Platforms (3/4)
- 5. Other SOA Platforms (4/4)
- 6. Auditing Service-Oriented Architectures (1/4)
- 6. Auditing Service-Oriented Architectures (2/4)
- 6. Auditing Service-Oriented Architectures (3/4)
- 6. Auditing Service-Oriented Architectures (4/4)
- 7. Defending and Detecting Attacks (1/2)
- 7. Defending and Detecting Attacks (2/2)
- 8. Architecture (1/4)
- 8. Architecture (2/4)
- 8. Architecture (3/4)
- 8. Architecture (4/4)
- Bibliography (1/2)
- Bibliography (2/2)
Product information
- Title: Security for Service Oriented Architectures
- Author(s):
- Release date: April 2014
- Publisher(s): Auerbach Publications
- ISBN: 9781466584044
You might also like
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …
book
SOA Security
Anyone seeking to implement SOA Security is forced to dig through a maze of inter-dependent specifications …
book
Cybersecurity in the COVID-19 Pandemic
This book demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat …
article
Managing Encryption Keys
This collection of shortcuts provides a practical and concise guide to securing cloud environments. It covers …