Core security patterns best practices and strategies for J2EE, Web services and identity management
Saved in:
Main Author: | |
---|---|
Other Authors: | , |
Format: | Unknown |
Published: |
Upper Saddle River, NJ
Prentice Hall Professional Technical Reference
2005
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000n a2200000 a 4501 | ||
---|---|---|---|
001 | wils-346111 | ||
020 | # | # | |a 0131463071 (pbk. : alk. paper) |
040 | # | # | |a DLC |d ITMB |
090 | 0 | 0 | |a QA76.73.J3 |b S834 2005 |
100 | 1 | # | |a Steel, Christopher |d 1968- |
245 | 1 | 0 | |a Core security patterns |b best practices and strategies for J2EE, Web services and identity management |c Christopher Steel, Ramesh Nagappan, Ray Lai |
260 | # | # | |a Upper Saddle River, NJ |b Prentice Hall Professional Technical Reference |c 2005 |
300 | # | # | |a xlvi, 1041 p. |b ill. |c 25 cm |
504 | # | # | |a Includes bibliographical references and index |
650 | # | 0 | |a Computer security |
650 | # | 0 | |a Java (Computer program language) |
700 | 1 | # | |a Lai, Ray |
700 | # | # | |a Nagappan, Ramesh |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=346111 |
964 | # | # | |c BOK |d 01 |
998 | # | # | |a 00260##a0011.2.2||00260##b0011.2.2||00260##c0011.2.2||00300##a0011.2.2||00300##b0011.2.2||00300##c0011.2.2||01700##a0011.2.2|| |