๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

โœ Scribed by Christopher Steel, Ramesh Nagappan, Ray Lai


Book ID
127449537
Publisher
Prentice Hall
Year
2005
Tongue
English
Weight
7 MB
Edition
1
Category
Library
ISBN
0131463071

No coin nor oath required. For personal study only.

โœฆ Synopsis


For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


๐Ÿ“œ SIMILAR VOLUMES


Core J2EE Patterns: Best Practices and D
โœ Deepak Alur, Dan Malks, John Crupi ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Prentice-Hall ๐ŸŒ English โš– 4 MB

Developers often confuse learning the technology with learning to design with the technology. In this book, senior architects from the Sun Java Center share their cumulative design experience on Java 2 Platform, Enterprise Edition (J2EE) technology.The primary focus of the book is on patterns, best

J2EE Security for Servlets, EJBs and Web
โœ Pankaj Kumar ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Prentice Hall ๐ŸŒ English โš– 2 MB

Dealing with security issues continues to be challenging for programmers and developers. In this book, expert practitioner Pankaj Kumar walks through both the descriptions and resolutions of those security issues that Java professionals will run into while designing, building, deploying and operatin