|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocm55154972 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
040517s2004 maua ob 001 0 eng d |
010 |
|
|
|z 2003063781
|
040 |
|
|
|a OCL
|b eng
|e pn
|c OCL
|d OCLCQ
|d CEF
|d VLB
|d OCLCE
|d C6I
|d OCLCQ
|d AZU
|d NHM
|d MBB
|d OCLCQ
|d OCLCF
|d OCLCQ
|d COO
|d OCLCA
|d WYU
|d VT2
|d UAB
|d ERF
|d UKBTH
|d UHL
|d TOH
|d TAC
|d OCLCO
|d OCLCQ
|d FZL
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 607075537
|a 657577900
|a 729548921
|a 748094181
|a 759514904
|a 809685259
|a 1056341464
|a 1060860562
|a 1062913107
|a 1075557724
|a 1100873812
|a 1103256557
|a 1112584239
|a 1113426349
|a 1113850950
|a 1159658677
|a 1224586059
|a 1302704595
|a 1351587740
|a 1355685579
|a 1380764800
|
020 |
|
|
|z 0321118898
|q (pbk.)
|
020 |
|
|
|z 9780321118899
|q (pbk.)
|
020 |
|
|
|a 0321118898
|
020 |
|
|
|a 9780321118899
|
024 |
1 |
|
|a 076092018827
|
024 |
3 |
|
|a 9780321118899
|
024 |
8 |
|
|a 0321118898
|
029 |
1 |
|
|a HEBIS
|b 291420222
|
029 |
1 |
|
|a AU@
|b 000067110046
|
035 |
|
|
|a (OCoLC)55154972
|z (OCoLC)607075537
|z (OCoLC)657577900
|z (OCoLC)729548921
|z (OCoLC)748094181
|z (OCoLC)759514904
|z (OCoLC)809685259
|z (OCoLC)1056341464
|z (OCoLC)1060860562
|z (OCoLC)1062913107
|z (OCoLC)1075557724
|z (OCoLC)1100873812
|z (OCoLC)1103256557
|z (OCoLC)1112584239
|z (OCoLC)1113426349
|z (OCoLC)1113850950
|z (OCoLC)1159658677
|z (OCoLC)1224586059
|z (OCoLC)1302704595
|z (OCoLC)1351587740
|z (OCoLC)1355685579
|z (OCoLC)1380764800
|
037 |
|
|
|b 01157628
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a QA76.73.J3
|b E58 2004
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Enterprise Java security :
|b building secure J2EE applications /
|c Marco Pistoia [and others].
|
260 |
|
|
|a Boston :
|b Addison-Wesley,
|c ©2004.
|
300 |
|
|
|a 1 online resource (xxiii, 581 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
504 |
|
|
|a Includes bibliographical references (page 563) and index.
|
505 |
0 |
0 |
|g pt. I.
|t Enterprise Security and Java --
|g Ch. 1.
|t Overview of Java Technology and Security --
|g Ch. 2.
|t Enterprise Network Security and Java Technology --
|g pt. II.
|t Enterprise Java Components Security --
|g Ch. 3.
|t Enterprise Java Security Fundamentals --
|g Ch. 4.
|t Servlet and JSP Security --
|g Ch. 5.
|t EJB Security --
|g Ch. 6.
|t Enterprise Java Security Deployment Scenarios --
|g pt. III.
|t Foundations of Java 2 Security --
|g Ch. 7.
|t J2SE Security Fundamentals --
|g Ch. 8.
|t Java 2 Permission Model --
|g Ch. 9.
|t Authentication and Authorization with JAAS --
|g pt. IV.
|t Enterprise Java and Cryptography --
|g Ch. 10.
|t Theory of Cryptography --
|g Ch. 11.
|t Java 2 Platform and Cryptography --
|g Ch. 12.
|t PKCS and S/MIME in J2EE --
|g Ch. 13.
|t SSL and TLS Protocols in a J2EE Environment --
|g pt. V.
|t Advanced Topics --
|g Ch. 14.
|t Enterprise Security for Web Services --
|g Ch. 15.
|t Security Considerations for Container Providers --
|g Ch. 16.
|t Epilogue --
|g pt. VI.
|t Appendixes --
|g App. A.
|t Security of Distributed Object Architectures --
|g App. B.
|t X.509 Digital Certificates --
|g App. C.
|t Technical Acronyms Used in This Book.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [S.l.] :
|c HathiTrust Digital Library,
|d 2010.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2010
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
520 |
8 |
|
|a Enterprise Java™ Security: Building Secure J2EE™ Applications provides application developers and programmers with the know-how they need to utilize the latest Java security technologies in building secure enterprise infrastructures. Written by the leading Java security experts at IBM, this comprehensive guide covers the current status of the Java™ 2 Platform, Enterprise Edition (J2EE), and Java™ 2 Platform, Standard Edition (J2SE™), security architectures and offers practical solutions and usage patterns to address the challenges of Java security. To aid developers who need to build secure J2EE applications, Enterprise Java™ Security covers at length the J2EE security technologies, including the security aspects of servlets, JavaServer Pages(TM) (JSP™), and Enterprise JavaBeans™ (EJB™)—technologies that are at the core of the J2EE architecture. In addition, the book covers Web Services security. Examples and sample code are provided throughout the book to give readers a solid understanding of the underlying technology. The relationship between Java and cryptographic technologies is covered in great detail, including: Java Cryptography Architecture (JCA) Java Cryptography Extension (JCE) Public-Key Cryptography Standards (PKCS) Secure/Multipurpose Internet Mail Extensions (S/MIME) Java Secure Socket Extension (JSSE)
|
542 |
|
|
|f Copyright © 2004 by Pearson Education, Inc.
|g 2004
|
542 |
|
|
|f Copyright © 2004 by Pearson Education, Incorporated
|g 2004
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Java (Computer program language)
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Java (Langage de programmation)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Java (Computer program language)
|2 fast
|
653 |
|
|
|a Certification
|
700 |
1 |
|
|a Pistoia, Marco.
|
776 |
0 |
8 |
|i Print version:
|t Enterprise Java security.
|d Boston : Addison-Wesley, ©2004
|w (DLC) 2003063781
|w (OCoLC)53797146
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0321118898/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|