This week's book giveaway is in the Other Languages forum.
We're giving away four copies of Functional Reactive Programming and have Stephen Blackheath and Anthony Jones on-line!
See this thread for details.
Win a copy of Functional Reactive Programming this week in the Other Languages forum!
  • Post Reply
  • Bookmark Topic Watch Topic
  • New Topic

core security pattern - what security should implement in web application ?

 
Nakata kokuyo
Ranch Hand
Posts: 472
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
hi, mr Ramesh Nagappan and Christopher Steel, when we implement a web application , what are the security issues we should concern commonly and what are the technology should come on count first , thank you
 
Ramesh Nagappan
Author
Ranch Hand
Posts: 159
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
We always suggest to look security from an end-to-end application security perspective. There are many common issues related to J2EE application security, You may take a look the following URL for details and how to overcome them using security patterns.

http://www.coresecuritypatterns.com/downloads/DEV302_ChessSteelNagappanLai.pdf
[ January 10, 2006: Message edited by: Ramesh Nagappan ]
 
Christopher Steel
Greenhorn
Posts: 23
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Check out Chapter 9 - Securing the Web Tier- Design Strategies and Best Practices for a list of patterns as well as best practices and pitfalls. You will also want to look at Chapters 10, 11, and 12 if your Web application has a business tier or deals Web Services or Identity Management.
 
Christopher Steel
Greenhorn
Posts: 23
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Check out Chapter 9 - Securing the Web Tier- Design Strategies and Best Practices for a list of patterns as well as best practices and pitfalls. You will also want to look at Chapters 10, 11, and 12 if your Web application has a business tier or deals Web Services or Identity Management.
 
  • Post Reply
  • Bookmark Topic Watch Topic
  • New Topic