Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

I want to give thanks to God, who answered my prayer to complete this book, and to my family, who waited for me every night and weekend while I was writing.

I would like to also express thanks to the following individuals for their support:

  • Dr. Glen Reece, Kumar Swaminathan, and Samir Patel for their management and moral support.

  • Rafat Alvi, Glenn Brunette, Dwight Hare, Eve Maler, and Seth Procter, for their critical and honest review to ensure technical accuracy of the manuscript.

  • Anne Anderson, for her critical review and suggestions for Chapter 7.

Категории