Core security patterns : best practices and strategies for J2EE(TM), Web services, and identity management
by
 
Steel, Christopher, 1968-

Title
Core security patterns : best practices and strategies for J2EE(TM), Web services, and identity management

Author
Steel, Christopher, 1968-

Personal Author
Steel, Christopher, 1968-

Publication Information
Upper Saddle River, N.J. : Prentice Hall PTR ; London : Pearson Education [distributor], 2006.

Physical Description
1 online resource (xlvi, 1041 pages)

Local Note
O'Reilly

Subject Term
Java (Computer program language)
 
Computer security.
 
Java (Langage de programmation)
 
Sécurité informatique.
 
Computer security. (OCoLC)fst00872484
 
Java (Computer program language) (OCoLC)fst00982065

Added Author
Nagappan, Ramesh.
 
Lai, Ray.

Electronic Access
https://go.oreilly.com/library-access/library/view/-/0131463071/?ar
 
https://learning.oreilly.com/library/view/~/0131463071/?ar
 
https://learning.oreilly.com/library/view/~/0131463071


LibraryMaterial TypeItem BarcodeShelf NumberStatus
IYTE LibraryE-Book2288350-1001QA76.73 .J3 S834 2006O'reilly E-Books