Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
| Chapter 3. The Java 2 Platform Security Chapter 4. Java Extensible Security Architecture and APIs Chapter 5. J2EE Security Architecture |
Категории