XML Security

Blake Dournaee

  • 出版商: McGraw-Hill Education
  • 出版日期: 2002-02-06
  • 售價: $2,390
  • 貴賓價: 9.5$2,271
  • 語言: 英文
  • 頁數: 379
  • 裝訂: Paperback
  • ISBN: 0072193999
  • ISBN-13: 9780072193992
  • 相關分類: XML資訊安全
  • 下單後立即進貨 (約1週~2週)



Keep XML applications and documents secure with help from the leading authority in e-security

Get up to speed on XML and applied security technologies using this authoritative guide. Covering the fundamentals of XML structures and related security technologies--including XML signatures, XML encryption, and the XML key management specification--this resource contains both the conceptual information and the practical techniques you need to successfully work with this data-structuring language. Youll learn how to implement RSA Securitys product CertJ--which secures Java- and XML-based applications--and get advice for preventing against denial of service attacks and other security violations. Written by a member of RSA Securitys developer support team, this definitive book gives you all the knowledge you need to keep XML-based programs and documents digitally secure.

  • Learn to implement a solid XML security system using the latest technologies
  • Use the book as both a security and XML primer
  • Review schemas, DTDs, Xpointers, XSLT, namespaces, and more
  • Learn about the various signature types--such as enveloped, enveloping, and detached
  • Understand the structure, syntax, and processing rules of XML signature types
  • Examine the need for an XML key management system (XKMS)
  • Counteract specific security breaches--including denial of service and replay attacks
  • Find out about recent W3C XML security standards
  • Implement CERTJ--RSAs product which ensures security for Java and XML-based programs
  • See how data privacy can be applied to XML structures via encryption

Protect your XML-based programs and improve security with the most authoritative guide to XML security available.

For more information on RSA Press titles, please visit www.rsapress.com


   Ch. 1: Introduction
   Ch. 2: Security Primer
   Ch. 3: XML Primer
   Ch. 4: XML Signatures Part 1: Processing Rules and Examples
   Ch. 5: XML Signatures Part 2: Structure and Syntax
   Ch. 6: XML Encryption
   Ch. 7: XML Key Management (XKMS)
   Ch. 8: Case Studies
    Case Study #1: An example of how XML is used today
    Case Study #2: An example of how XML will be used tomorrow
   Ch. 9: Example Signature Implementation: RSA BSAFE Cert-J
   Ch. 10: What Is S2ML?