Wiley.com
Print this page Share

Distributed Systems Security: Issues, Processes and Solutions

List Price: US $122.75
Government Price: US $70.36
Enter Quantity:   Buy
Distributed Systems Security: Issues, Processes and Solutions (0470519886) cover image

Chapter 1: Introduction

1.1 Background

1.2 Distributed Systems.

1.3 Distributed Systems Security.

1.4 About the Book.

 

Chapter 2: Security Engineering.

2.1 Introduction.

2.2 Secure Development Life Cycle Processes – An Overview.

2.3 A Typical Security Engineering Process.

2.4 Important Security Engineering Guidelines and Resources.

2.5 Conclusion.

 

Chapter 3. Common Security Issues and Technologies.

3.1 Security Issues.

3.2 Common Security Techniques.

3.3 Summary.

 

Chapter 4 – Host level Threats and Vulnerabilities.

4.1 Background.

4.2 Malware.

4.3 Eavesdropping.

4.4 Job faults.

4.5 Resource starvation.

4.6 Overflow.

4.7 Privilege escalation.

4.8 Injection attacks.

4.9 Conclusion.

 

Chapter 5 – Infrastructure Level Threats & Vulnerabilities.

5.1 Introduction.

5.2 Network Level Threats and Vulnerabilities.

5.3 Grid Computing Threats and Vulnerabilities.

5.4 Storage Threats and Vulnerabilities.

 

Chapter 6: Application Level Vulnerabilities and Attacks.

6.1 Introduction.

6.2 Application Layer Vulnerabilities.

6.3 Conclusion.

 

Chapter 7 – Service Level Issues, Threats and Vulnerabilities.

7.1 Introduction.

7.2 SOA and Role of Standards.

7.3 Service Level Security Requirements.

7.4 Service Level Threats and Vulnerabilities.

7.5 Service Level Attacks.

7.6 Services Threat Profile.

7.7 Conclusions.

 

Chapter 8: Host level Solutions.

8.1 Background.

8.2 Sandboxing.

8.3 Virtualization.

8.4 Resource Management

8.5 Proof carrying code.

8.6 Memory firewall

8.7 Anti malware.

8.8 Conclusions.

 

Chapter 9 – Infrastructure Level Solutions

9.1 Introduction.

9.2 Network Level Solutions.

9.3 Grid Level Solutions.

9.4 Storage Level Solutions.

 

Chapter 10: Application Level Solutions.

10.1 Introduction.

10.2 Application Level Security Solutions.

10.3 Conclusion.

 

Chapter 11 – Service Level Solutions.

11.1 Introduction.

11.2 Services Security Policy.

11.3 SOA Security standards stack.

11.4 Standards in Depth.

11.5 Deployment Architectures for SOA Security.

11.6 Managing Service Level Threats.

11.7 Service Threat Solution Mapping.

11.8 XML Firewall Configuration-Threat Mapping.

11.9 Conclusions.

 

Chapter 12 - Case Study – Compliance in Financial Services.

12.1 Introduction.

12.2 SOX compliance.

12.3 SOX Security Solutions.

12.4 Multi-level policy driven solution architecture.

12.5 Conclusions.

 

Chapter 13 – Case Study of Grid.

13.1 Background.

13.2 Financial Application.

13.3 Security Requirements Analysis.

13.4 Final Security Architecture.

 

Chapter 14: Future directions and Conclusions.

14.1 Future directions.

14.2 Conclusions.

Related Titles

Communication System Security

by Seok-Yee Tang (Editor), Peter Muller (Editor), Hamid Sharif (Editor)
by Silke Holtmanns, Valtteri Niemi, Philip Ginzboorg, Pekka Laitinen, N. Asokan
by Igor S. Pandzic (Editor), Robert Forchheimer (Editor)
by Algirdas Pakštas (Editor), Ryoichi Komiya (Editor)
Back to Top