Cargando…
Core security patterns: best practices and strategies for J2EE, Web services and identity management
Autores principales: | , , |
---|---|
Lenguaje: | eng |
Publicado: |
Prentice Hall Professional Technical Reference
2005
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1508361 |
_version_ | 1780927598606417920 |
---|---|
author | Steel, Christopher Lai, Ray Nagappan, Ramesh |
author_facet | Steel, Christopher Lai, Ray Nagappan, Ramesh |
author_sort | Steel, Christopher |
collection | CERN |
id | cern-1508361 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2005 |
publisher | Prentice Hall Professional Technical Reference |
record_format | invenio |
spelling | cern-15083612021-04-21T23:44:05Zhttp://cds.cern.ch/record/1508361engSteel, ChristopherLai, RayNagappan, RameshCore security patterns: best practices and strategies for J2EE, Web services and identity managementComputing and ComputersPrentice Hall Professional Technical Referenceoai:cds.cern.ch:15083612005 |
spellingShingle | Computing and Computers Steel, Christopher Lai, Ray Nagappan, Ramesh Core security patterns: best practices and strategies for J2EE, Web services and identity management |
title | Core security patterns: best practices and strategies for J2EE, Web services and identity management |
title_full | Core security patterns: best practices and strategies for J2EE, Web services and identity management |
title_fullStr | Core security patterns: best practices and strategies for J2EE, Web services and identity management |
title_full_unstemmed | Core security patterns: best practices and strategies for J2EE, Web services and identity management |
title_short | Core security patterns: best practices and strategies for J2EE, Web services and identity management |
title_sort | core security patterns: best practices and strategies for j2ee, web services and identity management |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1508361 |
work_keys_str_mv | AT steelchristopher coresecuritypatternsbestpracticesandstrategiesforj2eewebservicesandidentitymanagement AT lairay coresecuritypatternsbestpracticesandstrategiesforj2eewebservicesandidentitymanagement AT nagappanramesh coresecuritypatternsbestpracticesandstrategiesforj2eewebservicesandidentitymanagement |