Web Services Security
Receive via shipping:
- Print bound version of the complete text
Part I: Introduction
1: Presenting Web Services
2: Presenting Security
3: New Challenges and New Threats
Part II: XML Security
4: XML Signature
5: XML Encryption
6: SAML
7: XACML
8: XML Key Management Specification (XKMS)
Part III: Security in SOAP: Presenting WS-Security
9: WS-Security
Part IV: Security in Web Services Frameworks
10: .NET and Passport
11: The Liberty Alliance Project
12: UDDI and Security
Part V: Conclusion
13: ebXML
14: Legal Considerations
A: Case Studies
2: Presenting Security
3: New Challenges and New Threats
Part II: XML Security
4: XML Signature
5: XML Encryption
6: SAML
7: XACML
8: XML Key Management Specification (XKMS)
Part III: Security in SOAP: Presenting WS-Security
9: WS-Security
Part IV: Security in Web Services Frameworks
10: .NET and Passport
11: The Liberty Alliance Project
12: UDDI and Security
Part V: Conclusion
13: ebXML
14: Legal Considerations
A: Case Studies
Part II: XML Security
4: XML Signature
5: XML Encryption
6: SAML
7: XACML
8: XML Key Management Specification (XKMS)
Part III: Security in SOAP: Presenting WS-Security
9: WS-Security
Part IV: Security in Web Services Frameworks
10: .NET and Passport
11: The Liberty Alliance Project
12: UDDI and Security
Part V: Conclusion
13: ebXML
14: Legal Considerations
A: Case Studies
5: XML Encryption
6: SAML
7: XACML
8: XML Key Management Specification (XKMS)
Part III: Security in SOAP: Presenting WS-Security
9: WS-Security
Part IV: Security in Web Services Frameworks
10: .NET and Passport
11: The Liberty Alliance Project
12: UDDI and Security
Part V: Conclusion
13: ebXML
14: Legal Considerations
A: Case Studies
7: XACML
8: XML Key Management Specification (XKMS)
Part III: Security in SOAP: Presenting WS-Security
9: WS-Security
Part IV: Security in Web Services Frameworks
10: .NET and Passport
11: The Liberty Alliance Project
12: UDDI and Security
Part V: Conclusion
13: ebXML
14: Legal Considerations
A: Case Studies
Part III: Security in SOAP: Presenting WS-Security
9: WS-Security
Part IV: Security in Web Services Frameworks
10: .NET and Passport
11: The Liberty Alliance Project
12: UDDI and Security
Part V: Conclusion
13: ebXML
14: Legal Considerations
A: Case Studies
Part IV: Security in Web Services Frameworks
10: .NET and Passport
11: The Liberty Alliance Project
12: UDDI and Security
Part V: Conclusion
13: ebXML
14: Legal Considerations
A: Case Studies
11: The Liberty Alliance Project
12: UDDI and Security
Part V: Conclusion
13: ebXML
14: Legal Considerations
A: Case Studies
Part V: Conclusion
13: ebXML
14: Legal Considerations
A: Case Studies
14: Legal Considerations
A: Case Studies
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Your definitive Web Services security resource
Minimize security risks in your system by successfully rolling out secure Web Services with help from this exceptional guide. Web Services Security covers everything network security professionals need to know, including details on Web Services architecture, SOAP, UDDI, WSDL, XML Signature, XML Encryption, SAML, XACML, XKMS, and more. You'll also get implementation techniques as well as case studies featuring global service-provision initiatives such as the Liberty Alliance Project. Practical, comprehensive, and up-to-date, this is a must-have reference for every administrator interested in conquering real-life security challenges through the effective use of Web Services.
- Learn the high-level principles of security and how they apply to Web Services
- Deploy Web Services technology following practical and clear examples
- Use XKMS for validation and accountability
- Ensure data integrity by using XML Signature and XML Encryption with SOAP
- Use SAML and XACML for authentication and authorization
- Learn the major components of the evolving ebXML standard
- Gain valuable insight into the legal aspects of Web Services security--including digital signature laws, privacy issues, and application-to-application transactions