Core security patterns best practices and strategies for J2EE, Web services and identity management
Saved in:
Main Author: | Steel, Christopher 1968- |
---|---|
Other Authors: | Lai, Ray, Nagappan, Ramesh |
Format: | Unknown |
Published: |
Upper Saddle River, NJ
Prentice Hall Professional Technical Reference
2005
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Core J2EE patterns best practices and design strategies
by: Alur, Deepak
Published: (2001) -
Core J2EE patterns best practices and design strategies
by: Alur, Deepak
Published: (2003) -
Enterprise Java security building secure J2EE applications
Published: (2004) -
Hacking exposed J2EE & JAVA developing secure applications with Java technology
by: Buege, Brian
Published: (2002) -
J2EE security for servlets, EJBs and Web services applying theory and standards to practice
by: Kumar, Pankaj
Published: (2004)