Filtern nach
-
Bereich
Letzte Suchanfragen
Ergebnisse für *
Es wurden 4 Ergebnisse gefunden.
Zeige Ergebnisse 1 bis 4 von 4.
Sortieren
-
Core security patterns
best practices and strategies for J2EE, web services and identity management -
Core security patterns
best practices and strategies for J2EE applications, web services, and identity management ; [a patterns catalog that includes twentythree new patterns for building end-to-end security ; security design methodology, patterns, best practices, reality checks, and defensive strategies ; applied techniques for Web services security, identy management, service provisioning, and personal identification ; comprehensive security guide to using J2SE, J2EE, J2ME, and Java Card] -
Core security patterns
best practices and strategies for J2EE , web services, and identity management ; [a patterns catalog that includes twentythree new patterns for building end-to-end security ; security design methodology, patterns, best practices, reality checks, and defensive strategies ; applied techniques for Web services security, identy management, service provisioning, and personal identification ; comprehensive security guide to using J2SE, J2EE, J2ME, and Java Card] -
Core security patterns
best practices and strategies for J2EE, web services and identity management