Search Results for - Narrowed by: Java (Computer program language) - Computer security.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Java$002b$002528Computer$002bprogram$002blanguage$002529$002509Java$002b$002528Computer$002bprogram$002blanguage$002529$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?
2024-05-31T10:51:35Z
Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10
ent://SD_ILS/0/SD_ILS:2332617
2024-05-31T10:51:35Z
2024-05-31T10:51:35Z
by Nita, Stefania Loredana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484281055/?ar">https://learning.oreilly.com/library/view/~/9781484281055/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar">https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484281055">https://learning.oreilly.com/library/view/~/9781484281055</a><br/>Format: Electronic Resources<br/>
The definitive guide to security in Jakarta EE : securing Java-based enterprise applications with Jakarta security, authorization, authentication and more
ent://SD_ILS/0/SD_ILS:2332630
2024-05-31T10:51:35Z
2024-05-31T10:51:35Z
by Tijms, Arjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484279458/?ar">https://learning.oreilly.com/library/view/~/9781484279458/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484279458">https://learning.oreilly.com/library/view/~/9781484279458</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar">https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar</a><br/>Format: Electronic Resources<br/>
Android software internals quick reference : a field manual and security reference guide to Java-based Android components
ent://SD_ILS/0/SD_ILS:2328407
2024-05-31T10:51:35Z
2024-05-31T10:51:35Z
by Stevenson, James, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484269145/?ar">https://go.oreilly.com/library-access/library/view/-/9781484269145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484269145/?ar">https://learning.oreilly.com/library/view/~/9781484269145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484269145">https://learning.oreilly.com/library/view/~/9781484269145</a><br/>Format: Electronic Resources<br/>
Hands-on cryptography with Java
ent://SD_ILS/0/SD_ILS:2319124
2024-05-31T10:51:35Z
2024-05-31T10:51:35Z
by Costlow, Erik, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar">https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781838554972/?ar">https://learning.oreilly.com/videos/~/9781838554972/?ar</a><br/>Format: Electronic Resources<br/>
Spring security : secure your web applications, RESTful services, and microservice architectures
ent://SD_ILS/0/SD_ILS:2230148
2024-05-31T10:51:35Z
2024-05-31T10:51:35Z
by Knutson, Mick, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5165113">Click to View</a><br/>Format: Electronic Resources<br/>
Spring Security LDAP integration and SAML extension
ent://SD_ILS/0/SD_ILS:2313943
2024-05-31T10:51:35Z
2024-05-31T10:51:35Z
by Mishra, Ankit, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781787285538/?ar">https://learning.oreilly.com/videos/~/9781787285538/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787285538/?ar">https://go.oreilly.com/library-access/library/view/-/9781787285538/?ar</a><br/>Format: Electronic Resources<br/>
Securing Java web applications with Spring Security : from JDBC and LDAP authentication to UI and method level security
ent://SD_ILS/0/SD_ILS:2309363
2024-05-31T10:51:35Z
2024-05-31T10:51:35Z
by Bowersox, Kevin, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781771375306/?ar">https://learning.oreilly.com/videos/~/9781771375306/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781771375306/?ar">https://go.oreilly.com/library-access/library/view/-/9781771375306/?ar</a><br/>Format: Electronic Resources<br/>
The CERT Oracle Secure Coding Standard for Java
ent://SD_ILS/0/SD_ILS:2293394
2024-05-31T10:51:35Z
2024-05-31T10:51:35Z
by Long, Fred, 1947-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132882842/?ar">https://go.oreilly.com/library-access/library/view/-/9780132882842/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132882842/?ar">https://learning.oreilly.com/library/view/~/9780132882842/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132882842">https://learning.oreilly.com/library/view/~/9780132882842</a><br/>Format: Electronic Resources<br/>
Core security patterns : best practices and strategies for J2EE(TM), Web services, and identity management
ent://SD_ILS/0/SD_ILS:2288350
2024-05-31T10:51:35Z
2024-05-31T10:51:35Z
by Steel, Christopher, 1968-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0131463071/?ar">https://go.oreilly.com/library-access/library/view/-/0131463071/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131463071/?ar">https://learning.oreilly.com/library/view/~/0131463071/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131463071">https://learning.oreilly.com/library/view/~/0131463071</a><br/>Format: Electronic Resources<br/>
Core security patterns : best practices and strategies for J2EE, Web services, and identity management
ent://SD_ILS/0/SD_ILS:48024
2024-05-31T10:51:35Z
2024-05-31T10:51:35Z
by Steel, Christopher, 1968-<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip0516/2005020502.html">http://www.loc.gov/catdir/toc/ecip0516/2005020502.html</a><br/>Format: Books<br/>
Enterprise Java security : building secure J2EE applications
ent://SD_ILS/0/SD_ILS:2281355
2024-05-31T10:51:35Z
2024-05-31T10:51:35Z
by Pistoia, Marco.<br/><a href="https://learning.oreilly.com/library/view/~/0321118898">https://learning.oreilly.com/library/view/~/0321118898</a>
<a href="https://learning.oreilly.com/library/view/~/0321118898/?ar">https://learning.oreilly.com/library/view/~/0321118898/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321118898/?ar">https://go.oreilly.com/library-access/library/view/-/0321118898/?ar</a><br/>Format: Electronic Resources<br/>
Inside Java 2 platform security : architecture, API design, and implementation
ent://SD_ILS/0/SD_ILS:2288322
2024-05-31T10:51:35Z
2024-05-31T10:51:35Z
by Gong, Li.<br/><a href="https://learning.oreilly.com/library/view/~/0201787911">https://learning.oreilly.com/library/view/~/0201787911</a>
<a href="https://learning.oreilly.com/library/view/~/0201787911/?ar">https://learning.oreilly.com/library/view/~/0201787911/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0201787911/?ar">https://go.oreilly.com/library-access/library/view/-/0201787911/?ar</a><br/>Format: Electronic Resources<br/>
J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice
ent://SD_ILS/0/SD_ILS:2326839
2024-05-31T10:51:35Z
2024-05-31T10:51:35Z
by Kumar, Pankaj, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131402641/?ar">https://learning.oreilly.com/library/view/~/0131402641/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131402641">https://learning.oreilly.com/library/view/~/0131402641</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131402641/?ar">https://go.oreilly.com/library-access/library/view/-/0131402641/?ar</a><br/>Format: Electronic Resources<br/>
Java security
ent://SD_ILS/0/SD_ILS:2286384
2024-05-31T10:51:35Z
2024-05-31T10:51:35Z
by Oaks, Scott.<br/><a href="https://learning.oreilly.com/library/view/~/0596001576/?ar">https://learning.oreilly.com/library/view/~/0596001576/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596001576">https://learning.oreilly.com/library/view/~/0596001576</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596001576/?ar">https://go.oreilly.com/library-access/library/view/-/0596001576/?ar</a><br/>Format: Electronic Resources<br/>
Java security handbook
ent://SD_ILS/0/SD_ILS:2281327
2024-05-31T10:51:35Z
2024-05-31T10:51:35Z
by Jaworski, Jamie.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672316021/?ar">https://go.oreilly.com/library-access/library/view/-/0672316021/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672316021">https://learning.oreilly.com/library/view/~/0672316021</a>
<a href="https://learning.oreilly.com/library/view/~/0672316021/?ar">https://learning.oreilly.com/library/view/~/0672316021/?ar</a><br/>Format: Electronic Resources<br/>
Java security
ent://SD_ILS/0/SD_ILS:2280603
2024-05-31T10:51:35Z
2024-05-31T10:51:35Z
by Oaks, Scott.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1565924037/?ar">https://go.oreilly.com/library-access/library/view/-/1565924037/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1565924037">https://learning.oreilly.com/library/view/~/1565924037</a>
<a href="https://learning.oreilly.com/library/view/~/1565924037/?ar">https://learning.oreilly.com/library/view/~/1565924037/?ar</a><br/>Format: Electronic Resources<br/>