Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management Login for the JSON version of this page.
Average: 0.00, 0 Ratings
Title
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN-10
0-13-311976-9
ISBN-13
978-0-13-311976-3
Author(s)
Christopher Steel, Ramesh Nagappan, Ray Lai
Publisher
Brand: Prentice Hall, Pearson Education, Limited, Pearson P T R, Prentice Hall
Published
2024
Format
Paperback
Subtitle
Login for full book details.
Series
Login to see series details.
Imprint
Login for imprint details.
Pages
651
Language
Login for language details.
Subjects
Login for subjects details.
Genre
Login for genre details.
Description

Login for description.

Metadata
EAN
9780133119763
ASIN
0133119769
Prefix
978
Group
0
Group Name
English language
Group Identifier
978-0
Registrant
13
Publication
311976
Check Digit
3
Formatted
978-0-13-311976-3

Related Articles from our Blog

What is an EAN and How Does it Relate to an ISBN?

If you’ve ever purchased a product online or in a store, you’ve likely come across a barcode. Behind these barcodes lies a standardized system that makes modern commerce possible. Two key codes often encountered are the EAN (European Article Number) and ISBN (International Standard Book Number). But what are they, how are they connected, and why are they so crucial? Let’s explore.

Read More