Core security patterns : best practices and strategies for J2EE, TM web services, andidentity management / Christopher Steel ; Ramesh Nagappan ; Ray Lia.
Saved in:
Table of Contents |
|
Personal Name(s): | Steel, Christopher. |
Nagappan, Ramesh. / Lai, Ray. | |
Imprint: |
Upper Saddle River, NJ :
Prentice Hall,
2006.
|
Physical Description: |
XLIV, 1041 S. |
Note: |
englisch |
ISBN: |
0131463071 9780131463073 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Prentice Hall core series.
|
Subject (ZB): | |
Classification: |
LEADER | 01164cam a2200277 n 4500 | ||
---|---|---|---|
001 | 219576 | ||
005 | 20070227155300.0 | ||
008 | r2006 | ||
020 | |a 0131463071 | ||
035 | |a (Sirsi) a172488 | ||
084 | 0 | |a DZE - Data privacy, data security |2 ZB | |
245 | 0 | 0 | |a Core security patterns : |b best practices and strategies for J2EE, TM web services, andidentity management / |c Christopher Steel ; Ramesh Nagappan ; Ray Lia. |
260 | |a Upper Saddle River, NJ : |b Prentice Hall, |c 2006. | ||
300 | |a XLIV, 1041 S. | ||
490 | 0 | |a Prentice Hall core series. | |
500 | |a englisch | ||
596 | |a 34 | ||
650 | 4 | |a computer security | |
650 | 4 | |a Java ( programming language ) | |
700 | 1 | |a Steel, Christopher. | |
700 | 1 | |a Nagappan, Ramesh. | |
700 | 1 | |a Lai, Ray. | |
856 | |u http://wwwzb.fz-juelich.de/contentenrichment/inhaltsverzeichnisse/bis2009/ISBN-0-13-146307-1.pdf |z Inhaltsverzeichnis | ||
900 | |a B 090984'01' | ||
908 | |a Handbuch | ||
949 | |a B 090984'01' |w LC |c 1 |i 1207100402 |d 7/5/2013 |e 7/5/2013 |k CHECKEDOUT |l STACKS |m JSC |n 6 |p €45.59 |r M |s Y |t INSTB |u 25/3/2009 |x INST-D |z KM_07 |1 PRINT |2 HB |o .CIRCNOTE. Dauerleihe ZAM, zurück an Benutzer |