66,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in über 4 Wochen
  • Broschiertes Buch

HIGHLIGHT
A practitioner’s guide to implementing and architecting security in enterprises
that use SOA. Covers WS-Security, XML Encryption, XML Signatures, and
SAML. It is the only book in the market that is hands-on, at the code level.
DESCRIPTION
Anyone seeking to implement SOA Security is forced to dig through a maze of
inter-dependent specifications and API docs that assume a lot of prior security
knowledge on the part of readers. Getting started on a project is proving to be a
huge challenge to practitioners. This book seeks to change that. It provides
…mehr

Produktbeschreibung
HIGHLIGHT

A practitioner’s guide to implementing and architecting security in enterprises

that use SOA. Covers WS-Security, XML Encryption, XML Signatures, and

SAML. It is the only book in the market that is hands-on, at the code level.

DESCRIPTION

Anyone seeking to implement SOA Security is forced to dig through a maze of

inter-dependent specifications and API docs that assume a lot of prior security

knowledge on the part of readers. Getting started on a project is proving to be a

huge challenge to practitioners. This book seeks to change that. It provides a

bottom-up understanding of security techniques appropriate for use in SOA

without assuming any prior familiarity with security topics.

Unlike most other books about SOA that merely describe the standards, this

book helps readers learn through action, by walking them through sample code

that illustrates how real life problems can be solved using the techniques and best

practices described in the standards. It simplifies things: where standards usually

discuss many possible variations of each security technique, this book focuses

on the 20% of variations that are used 80% of the time. This keeps the material

covered useful for all readers except the most advanced.

KEY POINTS

• Why SOA Security is different from ordinary computer security, with

real life examples from popular domains such as finance, logistics, and

government

• Uses open source tools and code examples to show how things work.

This knowledge is then useful for work with proprietary tools.

• Assumes no prior security knowledge

MARKET INFORMATION

One of the major obstacles to implementing SOA in enterprises is the difficulty

in grasping what is different about security in SOA. There is a lot of published

material out there about SOA security—but it does not provide the specifics

on how to plan, design, and implement enterprise-class SOA security architecture.

This book addresses that challenge in a hands-on way.

Product Description
HIGHLIGHT

A practitioner’s guide to implementing and architecting security in enterprises

that use SOA. Covers WS-Security, XML Encryption, XML Signatures, and

SAML. It is the only book in the market that is hands-on, at the code level.

DESCRIPTION

Anyone seeking to implement SOA Security is forced to dig through a maze of

inter-dependent specifications and API docs that assume a lot of prior security

knowledge on the part of readers. Getting started on a project is proving to be a

huge challenge to practitioners. This book seeks to change that. It provides a

bottom-up understanding of security techniques appropriate for use in SOA

without assuming any prior familiarity with security topics.

Unlike most other books about SOA that merely describe the standards, this

book helps readers learn through action, by walking them through sample code

that illustrates how real life problems can be solved using the techniques and best

practices described in the standards. It simplifies things: where standards usually

discuss many possible variations of each security technique, this book focuses

on the 20% of variations that are used 80% of the time. This keeps the material

covered useful for all readers except the most advanced.

KEY POINTS

• Why SOA Security is different from ordinary computer security, with

real life examples from popular domains such as finance, logistics, and

government

• Uses open source tools and code examples to show how things work.

This knowledge is then useful for work with proprietary tools.

• Assumes no prior security knowledge

MARKET INFORMATION

One of the major obstacles to implementing SOA in enterprises is the difficulty

in grasping what is different about security in SOA. There is a lot of published

material out there about SOA security—but it does not provide the specifics

on how to plan, design, and implement enterprise-class SOA security architecture.

This book addresses that challenge in a hands-on way.
SOA is one of the latest technologies enterprises are using to tame their software costs - in development, deployment, and management. SOA makes integration easy, helping enterprises not only better utilize their existing investments in applications and infrastructure, but also open up new business opportunities. However, one of the big stumbling blocks in executing SOA is security. This book addresses Security in SOA with detailed examples illustrating the theory, industry standards and best practices.

It is true that security is important in any system. SOA brings in additional security concerns as well rising out of the very openness that makes it attractive. If we apply security principles blindly, we shut ourselves of the benefits of SOA. Therefore, we need to understand which security models and techniques are right for SOA. This book provides such an understanding.

Usually, security is seen as an esoteric topic that is better left to experts. While it is truethat security requires expert attention, everybody, including software developers, designers, architects, IT administrators and managers need to do tasks that require very good understanding of security topics. Fortunately, traditional security techniques have been around long enough for people to understand and apply them in practice. This, however, is not the case with SOA Security.

Anyone seeking to implement SOA Security is today forced to dig through a maze of inter-dependent specifications and API docs that assume a lot of prior experience on the part of readers. Getting started on a project is hence proving to be a huge challenge to practitioners. This book seeks to change that. It provides bottom-up understanding of security techniques appropriate for use in SOA without assuming any prior familiarity with security topics on the part of the reader.

Unlike most other books about SOA that merely describe the standards, this book helps you get started immediately by walking you through sample code that illustrates how real life problems can be solved using the techniques and best practices described in standards. Whereas standards discuss all possible variations of each security technique, this book focusses on the 20% of variations that are used 80% of the time. This keeps the material covered in the book simple as well as self-sufficient for all readers except the most advanced.

Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.
Autorenporträt
Dr. Tamarao (Rama) Kanneganti is Chief Technology Officer (CTO) at HCL EAI Services. Rama has a Ph.D. in programming languages from Rice University and has worked at Bell Labs in databases and large programming systems. Currently, he advises enterprise clients in formulating and evaluating SOA strategies. Rama works out of Grosse Pointe Woods (near Detroit), Michigan, USA.