Search Results for - Narrowed by: Java (Computer program language) - Computer security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Java$002b$002528Computer$002bprogram$002blanguage$002529$002509Java$002b$002528Computer$002bprogram$002blanguage$002529$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-05-31T10:51:35Z Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 ent://SD_ILS/0/SD_ILS:2332617 2024-05-31T10:51:35Z 2024-05-31T10:51:35Z by&#160;Nita, Stefania Loredana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484281055/?ar">https://learning.oreilly.com/library/view/~/9781484281055/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar">https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484281055">https://learning.oreilly.com/library/view/~/9781484281055</a><br/>Format:&#160;Electronic Resources<br/> The definitive guide to security in Jakarta EE : securing Java-based enterprise applications with Jakarta security, authorization, authentication and more ent://SD_ILS/0/SD_ILS:2332630 2024-05-31T10:51:35Z 2024-05-31T10:51:35Z by&#160;Tijms, Arjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484279458/?ar">https://learning.oreilly.com/library/view/~/9781484279458/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484279458">https://learning.oreilly.com/library/view/~/9781484279458</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar">https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar</a><br/>Format:&#160;Electronic Resources<br/> Android software internals quick reference : a field manual and security reference guide to Java-based Android components ent://SD_ILS/0/SD_ILS:2328407 2024-05-31T10:51:35Z 2024-05-31T10:51:35Z by&#160;Stevenson, James, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484269145/?ar">https://go.oreilly.com/library-access/library/view/-/9781484269145/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484269145/?ar">https://learning.oreilly.com/library/view/~/9781484269145/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484269145">https://learning.oreilly.com/library/view/~/9781484269145</a><br/>Format:&#160;Electronic Resources<br/> Hands-on cryptography with Java ent://SD_ILS/0/SD_ILS:2319124 2024-05-31T10:51:35Z 2024-05-31T10:51:35Z by&#160;Costlow, Erik, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar">https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781838554972/?ar">https://learning.oreilly.com/videos/~/9781838554972/?ar</a><br/>Format:&#160;Electronic Resources<br/> Spring security : secure your web applications, RESTful services, and microservice architectures ent://SD_ILS/0/SD_ILS:2230148 2024-05-31T10:51:35Z 2024-05-31T10:51:35Z by&#160;Knutson, Mick, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5165113">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Spring Security LDAP integration and SAML extension ent://SD_ILS/0/SD_ILS:2313943 2024-05-31T10:51:35Z 2024-05-31T10:51:35Z by&#160;Mishra, Ankit, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781787285538/?ar">https://learning.oreilly.com/videos/~/9781787285538/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787285538/?ar">https://go.oreilly.com/library-access/library/view/-/9781787285538/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing Java web applications with Spring Security : from JDBC and LDAP authentication to UI and method level security ent://SD_ILS/0/SD_ILS:2309363 2024-05-31T10:51:35Z 2024-05-31T10:51:35Z by&#160;Bowersox, Kevin, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781771375306/?ar">https://learning.oreilly.com/videos/~/9781771375306/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781771375306/?ar">https://go.oreilly.com/library-access/library/view/-/9781771375306/?ar</a><br/>Format:&#160;Electronic Resources<br/> The CERT Oracle Secure Coding Standard for Java ent://SD_ILS/0/SD_ILS:2293394 2024-05-31T10:51:35Z 2024-05-31T10:51:35Z by&#160;Long, Fred, 1947-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132882842/?ar">https://go.oreilly.com/library-access/library/view/-/9780132882842/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132882842/?ar">https://learning.oreilly.com/library/view/~/9780132882842/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132882842">https://learning.oreilly.com/library/view/~/9780132882842</a><br/>Format:&#160;Electronic Resources<br/> Core security patterns : best practices and strategies for J2EE(TM), Web services, and identity management ent://SD_ILS/0/SD_ILS:2288350 2024-05-31T10:51:35Z 2024-05-31T10:51:35Z by&#160;Steel, Christopher, 1968-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0131463071/?ar">https://go.oreilly.com/library-access/library/view/-/0131463071/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0131463071/?ar">https://learning.oreilly.com/library/view/~/0131463071/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0131463071">https://learning.oreilly.com/library/view/~/0131463071</a><br/>Format:&#160;Electronic Resources<br/> Core security patterns : best practices and strategies for J2EE, Web services, and identity management ent://SD_ILS/0/SD_ILS:48024 2024-05-31T10:51:35Z 2024-05-31T10:51:35Z by&#160;Steel, Christopher, 1968-<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip0516/2005020502.html">http://www.loc.gov/catdir/toc/ecip0516/2005020502.html</a><br/>Format:&#160;Books<br/> Enterprise Java security : building secure J2EE applications ent://SD_ILS/0/SD_ILS:2281355 2024-05-31T10:51:35Z 2024-05-31T10:51:35Z by&#160;Pistoia, Marco.<br/><a href="https://learning.oreilly.com/library/view/~/0321118898">https://learning.oreilly.com/library/view/~/0321118898</a> <a href="https://learning.oreilly.com/library/view/~/0321118898/?ar">https://learning.oreilly.com/library/view/~/0321118898/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0321118898/?ar">https://go.oreilly.com/library-access/library/view/-/0321118898/?ar</a><br/>Format:&#160;Electronic Resources<br/> Inside Java 2 platform security : architecture, API design, and implementation ent://SD_ILS/0/SD_ILS:2288322 2024-05-31T10:51:35Z 2024-05-31T10:51:35Z by&#160;Gong, Li.<br/><a href="https://learning.oreilly.com/library/view/~/0201787911">https://learning.oreilly.com/library/view/~/0201787911</a> <a href="https://learning.oreilly.com/library/view/~/0201787911/?ar">https://learning.oreilly.com/library/view/~/0201787911/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0201787911/?ar">https://go.oreilly.com/library-access/library/view/-/0201787911/?ar</a><br/>Format:&#160;Electronic Resources<br/> J2EE&trade; Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice ent://SD_ILS/0/SD_ILS:2326839 2024-05-31T10:51:35Z 2024-05-31T10:51:35Z by&#160;Kumar, Pankaj, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131402641/?ar">https://learning.oreilly.com/library/view/~/0131402641/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0131402641">https://learning.oreilly.com/library/view/~/0131402641</a> <a href="https://go.oreilly.com/library-access/library/view/-/0131402641/?ar">https://go.oreilly.com/library-access/library/view/-/0131402641/?ar</a><br/>Format:&#160;Electronic Resources<br/> Java security ent://SD_ILS/0/SD_ILS:2286384 2024-05-31T10:51:35Z 2024-05-31T10:51:35Z by&#160;Oaks, Scott.<br/><a href="https://learning.oreilly.com/library/view/~/0596001576/?ar">https://learning.oreilly.com/library/view/~/0596001576/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596001576">https://learning.oreilly.com/library/view/~/0596001576</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596001576/?ar">https://go.oreilly.com/library-access/library/view/-/0596001576/?ar</a><br/>Format:&#160;Electronic Resources<br/> Java security handbook ent://SD_ILS/0/SD_ILS:2281327 2024-05-31T10:51:35Z 2024-05-31T10:51:35Z by&#160;Jaworski, Jamie.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672316021/?ar">https://go.oreilly.com/library-access/library/view/-/0672316021/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672316021">https://learning.oreilly.com/library/view/~/0672316021</a> <a href="https://learning.oreilly.com/library/view/~/0672316021/?ar">https://learning.oreilly.com/library/view/~/0672316021/?ar</a><br/>Format:&#160;Electronic Resources<br/> Java security ent://SD_ILS/0/SD_ILS:2280603 2024-05-31T10:51:35Z 2024-05-31T10:51:35Z by&#160;Oaks, Scott.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1565924037/?ar">https://go.oreilly.com/library-access/library/view/-/1565924037/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1565924037">https://learning.oreilly.com/library/view/~/1565924037</a> <a href="https://learning.oreilly.com/library/view/~/1565924037/?ar">https://learning.oreilly.com/library/view/~/1565924037/?ar</a><br/>Format:&#160;Electronic Resources<br/>