Tip

How to make Web services secure

This Learning Guide originally appeared on SearchAppSecurity.com, a sister site of SearchSMB.com.

Web application threats abound. If you use Web services with those applications, then there are other security issues you need

    Requires Free Membership to View

to be aware of. In fact, some say Web services, if not secured properly, can pose security threats that extend beyond those of traditional Web applications. Those weaknesses, they say, result from some Web services' greatest strengths.

What are those weaknesses and how should you handle them? These articles, tips, books and other resources answer those questions and help you get a grip on how to protect and deploy secure Web services.

If you know of an article, tip, tool or code sample that should be included, send me an email with the information and I'll add it. -- Michelle Davidson, Site Editor.

TABLE OF CONTENTS
   Web Services Security Basics
   Web Services Threats and Vulnerabilities
   Web Services Security Standards
   SAML
   Java and Web Services
   .NET and Web Services
   Securing XML
   Web Services Security Tools
   Other Useful Resources


  Web Services Security Basics Table of Contents
  Web Services Threats and Vulnerabilities Table of Contents
  Web Services Security Standards Table of Contents
  SAML Table of Contents
  Java and Web Services Table of Contents
  .NET and Web Services Table of Contents
  Securing XML Table of Contents
  Web Services Security Tools Table of Contents

Tool Web sites

  Other Useful Resources Table of Contents
Expert advice on Web services security

Do you have a question about Web services security that you're having trouble getting answered? Web services security expert Rami Jaamour can help. Read advice he has given or submit your own questions.



Send in your suggestions
Are there other topics you'd like to see learning guides on? Send SearchAppSecurity.com site editor Michelle Davidson an e-mail at mdavidson@techtarget.com and let her know what they are.


This was first published in May 2006

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.