Cargando…

Core security patterns: best practices and strategies for J2EE, Web services and identity management

Detalles Bibliográficos
Autores principales: Steel, Christopher, Lai, Ray, Nagappan, Ramesh
Lenguaje:eng
Publicado: Prentice Hall Professional Technical Reference 2005
Materias:
Acceso en línea:http://cds.cern.ch/record/1508361
_version_ 1780927598606417920
author Steel, Christopher
Lai, Ray
Nagappan, Ramesh
author_facet Steel, Christopher
Lai, Ray
Nagappan, Ramesh
author_sort Steel, Christopher
collection CERN
id cern-1508361
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2005
publisher Prentice Hall Professional Technical Reference
record_format invenio
spelling cern-15083612021-04-21T23:44:05Zhttp://cds.cern.ch/record/1508361engSteel, ChristopherLai, RayNagappan, RameshCore security patterns: best practices and strategies for J2EE, Web services and identity managementComputing and ComputersPrentice Hall Professional Technical Referenceoai:cds.cern.ch:15083612005
spellingShingle Computing and Computers
Steel, Christopher
Lai, Ray
Nagappan, Ramesh
Core security patterns: best practices and strategies for J2EE, Web services and identity management
title Core security patterns: best practices and strategies for J2EE, Web services and identity management
title_full Core security patterns: best practices and strategies for J2EE, Web services and identity management
title_fullStr Core security patterns: best practices and strategies for J2EE, Web services and identity management
title_full_unstemmed Core security patterns: best practices and strategies for J2EE, Web services and identity management
title_short Core security patterns: best practices and strategies for J2EE, Web services and identity management
title_sort core security patterns: best practices and strategies for j2ee, web services and identity management
topic Computing and Computers
url http://cds.cern.ch/record/1508361
work_keys_str_mv AT steelchristopher coresecuritypatternsbestpracticesandstrategiesforj2eewebservicesandidentitymanagement
AT lairay coresecuritypatternsbestpracticesandstrategiesforj2eewebservicesandidentitymanagement
AT nagappanramesh coresecuritypatternsbestpracticesandstrategiesforj2eewebservicesandidentitymanagement