Core security patterns best practices and strategies for J2EE, Web services and identity management

Saved in:
Bibliographic Details
Main Author: Steel, Christopher 1968-
Other Authors: Lai, Ray, Nagappan, Ramesh
Format: Unknown
Published: Upper Saddle River, NJ Prentice Hall Professional Technical Reference 2005
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000n a2200000 a 4501
001 wils-346111
020 # # |a 0131463071 (pbk. : alk. paper) 
040 # # |a DLC  |d ITMB 
090 0 0 |a QA76.73.J3  |b S834 2005 
100 1 # |a Steel, Christopher  |d 1968- 
245 1 0 |a Core security patterns  |b best practices and strategies for J2EE, Web services and identity management  |c Christopher Steel, Ramesh Nagappan, Ray Lai 
260 # # |a Upper Saddle River, NJ  |b Prentice Hall Professional Technical Reference  |c 2005 
300 # # |a xlvi, 1041 p.  |b ill.  |c 25 cm 
504 # # |a Includes bibliographical references and index 
650 # 0 |a Computer security 
650 # 0 |a Java (Computer program language) 
700 1 # |a Lai, Ray 
700 # # |a Nagappan, Ramesh 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=346111 
964 # # |c BOK  |d 01 
998 # # |a 00260##a0011.2.2||00260##b0011.2.2||00260##c0011.2.2||00300##a0011.2.2||00300##b0011.2.2||00300##c0011.2.2||01700##a0011.2.2||