|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
OR_ocn697763160 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
020404e20020719mau o 000 0 eng d |
040 |
|
|
|a BIP US
|b eng
|e pn
|c S4S
|d OCLCQ
|d C6I
|d OCLCQ
|d CEF
|d OCLCO
|d OCLCF
|d WYU
|d VT2
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9780201756050
|
020 |
|
|
|a 0201756056
|q (Trade Paper)
|
024 |
1 |
|
|a 785342756050
|
029 |
1 |
|
|a AU@
|b 000057227737
|
035 |
|
|
|a (OCoLC)697763160
|
037 |
|
|
|b 01157628
|
050 |
|
4 |
|a QA76.9.A25E32 2002
|
082 |
0 |
4 |
|a 005.8
|2 21
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Niles, Kitty,
|e author.
|
245 |
1 |
0 |
|a Secure XML :
|b the New Syntax for Signatures and Encryption.
|
260 |
|
|
|a Boston :
|b Addison Wesley Professional,
|c July 2002.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
521 |
|
|
|a Scholarly & Professional
|b Addison Wesley Professional.
|
520 |
8 |
|
|a Annotation
|b -- Authoritative - author is well-known as the chair of the joint IETF/W3C working group setting the standards-- Comprehensive - covers XML encryption, confidentiality, authentication, digital signatures, message authentication, and cryptographic algorithms-- Timely - will be one of the first books available on XML SecurityAs XML is more broadly used in both web sites and business applications, the need to insure security of XML based applications grows. Most books on XML have at best a chapter devoted to security issues, and there is only one other book currently on the market devoted exclusively to XML Security. This book will show developers all they need to know about how to use XML Digital Signatures to protect the integrity and authenticity of data, and how to use XML Encryption to control its confidentiality. The lead author is at the center of the IETF and W3C working groups formalizing the standards, so there is no one better qualified to write about them. The book will also appeal to networking/security professionals who need to start dealing with the impact of XML on network security.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a XML (Document markup language)
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
6 |
|a XML (Langage de balisage)
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|
650 |
|
7 |
|a XML (Document markup language)
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Niles, Kitty.
|t Secure XML.
|d Boston : Addison Wesley Professional July 2002
|w (DLC) 2002066531
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0201756056/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|