Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SOA Security

Buy
SOA Security, 9781932394689 (1932394680), Manning Publications, 2008
SOA is one of the latest technologies enterprises are using to tame their software costs - in development, deployment, and management. SOA makes integration easy, helping enterprises not only better utilize their existing investments in applications and infrastructure, but also open up new business opportunities. However, one of the big stumbling blocks in executing SOA is security. This book addresses Security in SOA with detailed examples illustrating the theory, industry standards and best practices.

It is true that security is important in any system. SOA brings in additional security concerns as well rising out of the very openness that makes it attractive. If we apply security principles blindly, we shut ourselves of the benefits of SOA. Therefore, we need to understand which security models and techniques are right for SOA. This book provides such an understanding.

Usually, security is seen as an esoteric topic that is better left to experts. While it is true that security requires expert attention, everybody, including software developers, designers, architects, IT administrators and managers need to do tasks that require very good understanding of security topics. Fortunately, traditional security techniques have been around long enough for people to understand and apply them in practice. This, however, is not the case with SOA Security.

Anyone seeking to implement SOA Security is today forced to dig through a maze of inter-dependent specifications and API docs that assume a lot of prior experience on the part of readers. Getting started on a project is hence proving to be a huge challenge to practitioners. This book seeks to change that. It provides bottom-up understanding of security techniques appropriate for use in SOA without assuming any prior familiarity with security topics on the part of the reader.

Unlike most other books about SOA that merely describe the standards, this book helps you get started immediately by walking you through sample code that illustrates how real life problems can be solved using the techniques and best practices described in standards. Whereas standards discuss all possible variations of each security technique, this book focusses on the 20% of variations that are used 80% of the time. This keeps the material covered in the book simple as well as self-sufficient for all readers except the most advanced.

About the Author

Dr. Tamarao (Rama) Kanneganti is Chief Technology Officer (CTO) at HCL EAI Services. Rama has a Ph.D. in programming languages from Rice University and has worked at Bell Labs in databases and large programming systems. Currently, he advises enterprise clients in formulating and evaluating SOA strategies. Rama works out of Grosse Pointe Woods (near Detroit), Michigan, USA.

Prasad A. Chodavarapu is General Manager (Technology) at HCL EAI Services, Bangalore, India. Prasad leads service teams designing and deploying integration solutions at enterprises world-wide. Prasad's current focus is on the use of application-oriented networking technologies to implement and secure SOA.

(HTML tags aren't allowed.)

Don't Sweat the Small Stuff--and it's all small stuff
Don't Sweat the Small Stuff--and it's all small stuff

Braille edition of the popular bestseller. "Let go of the idea that gentle, relaxed people can't be super-achievers," advises Dr. Richard Carlson in his widely popular self-help book, DON'T SWEAT THE SMALL STUFF. In 100 chapters--each only a few pages long--Dr. Carlson shares his ideas for living a calmer, richer life. This...

C Programming - An Advanced Course
C Programming - An Advanced Course

This book takes up where C Programming - A Beginner's Course leaves off. It assumes you have a working knowledge of basic programming concepts such as variables, constants, assignment, selection (if..else) and looping (while, for). It also assumes you are comfortable with writing functions and working with arrays. If you are not, it is...

Identity and Data Security for Web Development: Best Practices
Identity and Data Security for Web Development: Best Practices

Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how...


Apple Pro Training Series: Motion 5
Apple Pro Training Series: Motion 5

 

Welcome to the official Apple Pro Training course for Motion 5, a behavior-driven motion graphics application that allows you to create stunning visual effects for a wide variety of projects.

This book is a comprehensive guide to designing with Motion. It covers the use of
...
Schema Matching and Mapping (Data-Centric Systems and Applications)
Schema Matching and Mapping (Data-Centric Systems and Applications)

This book provides an overview about the state-of-the-art solutions and the most recent advances in schema matching and mapping, both recognized as key areas of metadata management. Tasks involving metadata are indeed pervasive in databases and information systems and include schema evolution, schema and ontology integration and matching, XML...

Pro C# 2010 and the .NET 4 Platform, Fifth Edition
Pro C# 2010 and the .NET 4 Platform, Fifth Edition

The first edition of this book was released at the 2001 Tech-Ed conference in Atlanta, Georgia. At that time, the .NET platform was still a beta product, and in many ways, so was this book. This is not to say that the early editions of this text did not have merit—after all, the book was a 2002 Jolt Award finalist and it won the 2003...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy