|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
OR_ocn326736286 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
010626s2001 caua ob 001 0 eng d |
010 |
|
|
|z 2001276406
|
040 |
|
|
|a SCPER
|b eng
|e pn
|c CUSER
|d OCLCQ
|d OCLCE
|d OCLCQ
|d VLB
|d OCLCQ
|d UBF
|d CEF
|d OCLCQ
|d OCLCO
|d N$T
|d OCLCF
|d TEFOD
|d YDXCP
|d OCLCQ
|d TEFOD
|d EBLCP
|d OCLCQ
|d OCLCA
|d WYU
|d UAB
|d VT2
|d OCLCQ
|d UKAHL
|d OCLCQ
|d LVT
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 50671612
|a 606528948
|a 607887663
|a 620172903
|a 727107804
|a 748105234
|a 759513701
|a 848917947
|a 1056393336
|a 1061000602
|a 1062880882
|a 1074313327
|a 1083200213
|a 1103271377
|a 1104443262
|a 1129351703
|a 1191076920
|a 1202541497
|a 1240537868
|a 1302276330
|
020 |
|
|
|a 9781449372125
|q (electronic bk.)
|
020 |
|
|
|a 1449372120
|q (electronic bk.)
|
020 |
|
|
|a 9781449372118
|q (electronic bk.)
|
020 |
|
|
|a 1449372112
|q (electronic bk.)
|
020 |
|
|
|z 0596001576
|
020 |
|
|
|z 9780596001575
|
029 |
1 |
|
|a AU@
|b 000051562774
|
035 |
|
|
|a (OCoLC)326736286
|z (OCoLC)50671612
|z (OCoLC)606528948
|z (OCoLC)607887663
|z (OCoLC)620172903
|z (OCoLC)727107804
|z (OCoLC)748105234
|z (OCoLC)759513701
|z (OCoLC)848917947
|z (OCoLC)1056393336
|z (OCoLC)1061000602
|z (OCoLC)1062880882
|z (OCoLC)1074313327
|z (OCoLC)1083200213
|z (OCoLC)1103271377
|z (OCoLC)1104443262
|z (OCoLC)1129351703
|z (OCoLC)1191076920
|z (OCoLC)1202541497
|z (OCoLC)1240537868
|z (OCoLC)1302276330
|
037 |
|
|
|a B25EBB9E-0470-4F82-9249-3B6801DDE835
|b OverDrive, Inc.
|n http://www.overdrive.com
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a QA76.73.J38
|b O247 2001
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 21
|
084 |
|
|
|a 54.62
|2 bcl
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Oaks, Scott.
|
245 |
1 |
0 |
|a Java security /
|c Scott Oaks.
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Sebastopol, CA :
|b O'Reilly,
|c ©2001.
|
300 |
|
|
|a 1 online resource (xvi, 599 pages) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a The Java series
|
500 |
|
|
|a "Covers JAAS and JSEE"--Cover.
|
500 |
|
|
|a "Writing and deploying secure applications"--Cover.
|
500 |
|
|
|a "Covers Java 1.1, Java 2, and JCE 1.2.1"--Page 4 of cover.
|
504 |
|
|
|a Includes bibliographical references (pages 382-391) and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
0 |
|g 1.
|t Java Application Security
|g 1 --
|g 2.
|t The Default Sandbox
|g 18 --
|g 3.
|t Java Language Security
|g 43 --
|g 4.
|t The Security Manager
|g 58 --
|g 5.
|t The Access Controller
|g 84 --
|g 6.
|t Java Class Loaders
|g 112 --
|g 7.
|t Introduction to Cryptography
|g 131 --
|g 8.
|t Security Providers
|g 146 --
|g 9.
|t Keys and Certificates
|g 166 --
|g 10.
|t Key Management
|g 205 --
|g 11.
|t Message Digests
|g 244 --
|g 12.
|t Digital Signatures
|g 261 --
|g 13.
|t Cipher-Based Encryption
|g 288 --
|g 14.
|t SSL and HTTPS
|g 311 --
|g 15.
|t Authentication and Authorization
|g 346 --
|g A.
|t The Java.security File
|g 379 --
|g B.
|t Security Resources
|g 382 --
|g C.
|t Identity-Based Key Management
|g 392 --
|g D.
|t The Secure Java Container
|g 420 --
|g E.
|t Implementing a JCE Security Provider
|g 450 --
|g F.
|t Quick Reference
|g 458.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [S.l.] :
|c HathiTrust Digital Library,
|d 2010.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2010
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Java (Computer program language)
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Java (Langage de programmation)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Java (Computer program language)
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Oaks, Scott.
|t Java security.
|b 2nd ed.
|d Sebastopol, CA : O'Reilly, ©2001
|z 0596001576
|w (OCoLC)47195850
|
830 |
|
0 |
|a Java series (O'Reilly & Associates)
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0596001576/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL1224537
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 597446
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10798322
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12630782
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26833522
|
994 |
|
|
|a 92
|b IZTAP
|