Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

    Chapter 14.  Building End-to-End Security ArchitectureA Case Study

Категории