Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Chapter 9. Securing the Web TierDesign Strategies and Best Practices Chapter 10. Securing the Business TierDesign Strategies and Best Practices Chapter 11. Securing Web ServicesDesign Strategies and Best Practices Chapter 12. Securing the IdentityDesign Strategies and Best Practices Chapter 13. Secure Service ProvisioningDesign Strategies and Best Practices |
Категории