XML Security
Blake Dournaee
- 出版商: McGraw-Hill Education
- 出版日期: 2002-02-06
- 售價: $2,390
- 貴賓價: 9.5 折 $2,271
- 語言: 英文
- 頁數: 379
- 裝訂: Paperback
- ISBN: 0072193999
- ISBN-13: 9780072193992
-
相關分類:
XML、資訊安全
下單後立即進貨 (約1週~2週)
買這商品的人也買了...
-
$1,050$998 -
$680$578 -
$1,050$998 -
$580$493 -
$980$833 -
$990$970 -
$920$782 -
$1,300$1,235 -
$280$218 -
$590$466 -
$560$476 -
$850$723 -
$750$638 -
$490$382 -
$750$638 -
$780$663 -
$950$931 -
$650$507 -
$420$328 -
$590$460 -
$580$452 -
$650$507 -
$680$578 -
$720$612 -
$1,200$948
商品描述
Keep XML applications and documents secure with help from the leading authority in e-security
Get up to speed on XML and applied security technologies using this authoritative guide. Covering the fundamentals of XML structures and related security technologies--including XML signatures, XML encryption, and the XML key management specification--this resource contains both the conceptual information and the practical techniques you need to successfully work with this data-structuring language. Youll learn how to implement RSA Securitys product CertJ--which secures Java- and XML-based applications--and get advice for preventing against denial of service attacks and other security violations. Written by a member of RSA Securitys developer support team, this definitive book gives you all the knowledge you need to keep XML-based programs and documents digitally secure.
- Learn to implement a solid XML security system using the latest
technologies
- Use the book as both a security and XML primer
- Review schemas, DTDs, Xpointers, XSLT, namespaces, and more
- Learn about the various signature types--such as enveloped, enveloping,
and detached
- Understand the structure, syntax, and processing rules of XML signature
types
- Examine the need for an XML key management system (XKMS)
- Counteract specific security breaches--including denial of service and
replay attacks
- Find out about recent W3C XML security standards
- Implement CERTJ--RSAs product which ensures security for Java and
XML-based programs
- See how data privacy can be applied to XML structures via encryption
Protect your XML-based programs and improve security with the most
authoritative guide to XML security available.
For more information on
RSA Press titles, please visit www.rsapress.com
Contents
Ch. 1: Introduction
Ch. 2:
Security Primer
Ch. 3: XML
Primer
Ch. 4: XML Signatures Part 1: Processing Rules and
Examples
Ch. 5: XML Signatures Part 2: Structure and
Syntax
Ch. 6: XML Encryption
Ch. 7:
XML Key Management (XKMS)
Ch. 8: Case Studies
Case Study #1: An example of how XML is used today
Case Study #2: An example of how XML will be used
tomorrow
Ch. 9: Example Signature Implementation: RSA
BSAFE Cert-J
Ch. 10: What Is
S2ML?