Index
A
C
D
E
H
I
J
L
N
O
R
S
V
W
A
authentication
using JAAS
using LDAP
C
COM+ (extended component object model)
component object model.
D
database security
credit card encryption
DatabaseSecurity
deployment architecture
analyzing
authentication mechanism
current security infrastructure
data encryption
network topology
E
EJB (Enterprise JavaBeans)
enterprise JavaBeans. See EJB
H
HTTP (hypertext transfer protocol)
HTTPS (hypertext transfer protocol secure)
hypertext transfer protocol. See HTTP
hypertext transfer protocol secure. See HTTPS
I
installing application server
Internet Explorer security
adding trusted web site
J
JAAS (Java Authentication and Authorization Service)
Java Authentication and Authorization Service. See JAAS
Java messaging service. See JMS
Java naming and directory interface. See JNDI
Java protocol
disabling
(1)
,
(2)
,
(3)
EJB
HTTP
JMS
Java protocols
securing
COM+
EJB
HTTP API tester
JavaProtocolSecurityMeasures
JavaServer pages. See JSP
JMS (Java messaging service)
JNDI (Java naming and directory interface)
JSP (JavaServer Pages)
L
LAN (local area network)
LDAP (lightweight directory access protocol)
lightweight directory access protocol. See LDAP
local area network. See LAN
N
network topology
deployment over internet
deployment over LAN
deployment over VPN
O
operating system permissions
R
recommended data encryption
SSL 128-bit
VPN 3DES
remote method invocation. See RMI
RMI (remote method invocation)
S
security
database security
deployment architecture
Java protocol See Java protocol
web security See web security
security plan
creating
V
virtual private network. See VPN
VPN (virtual private network)
W
web security
routing
session security
web server executables