Letzte Suchanfragen
Ergebnisse für *
Es wurden 9 Ergebnisse gefunden.
Zeige Ergebnisse 1 bis 9 von 9.
Sortieren
-
Core security patterns
best practices and strategies for J2EE, web services and identity management -
J2EE platform Web services
-
Core security patterns
best practices and strategies for J2EE(TM), Web services, and identity management -
Core security patterns
best practices and strategies for J2EE(TM), Web services, and identity management -
Core security patterns
best practices and strategies for J2EE applications, web services, and identity management ; [a patterns catalog that includes twentythree new patterns for building end-to-end security ; security design methodology, patterns, best practices, reality checks, and defensive strategies ; applied techniques for Web services security, identy management, service provisioning, and personal identification ; comprehensive security guide to using J2SE, J2EE, J2ME, and Java Card] -
J2EE platform web services
-
Core security patterns
best practices and strategies for J2EE , web services, and identity management ; [a patterns catalog that includes twentythree new patterns for building end-to-end security ; security design methodology, patterns, best practices, reality checks, and defensive strategies ; applied techniques for Web services security, identy management, service provisioning, and personal identification ; comprehensive security guide to using J2SE, J2EE, J2ME, and Java Card] -
J2EE platform Web services
-
Core security patterns
best practices and strategies for J2EE, web services and identity management