Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
[LiGong] Li Gong. "Java Security Architecture," in "Java™ 2 SDK, Standard Edition Documentation Version 1.4.2." Sun Microsystems, 2003. http://java.sun.com/j2se/1.4.2/docs/guide/security/spec/security-spec.doc1.html and http://java.sun.com/j2se/1.4.2/docs/guide/security/spec/security-spec.doc2.html [J2EE-WS-Blueprints] J2EE Blueprints: Designing Web Services with the J2EE Platform, 2nd EditionGuidelines, Patterns, and Code for Java Web services. http://java.sun.com/blueprints/guidelines/designing_webservices/ [J2EE-Blueprints] J2EE Blueprints: Designing Enterprise Applications with the J2EE Platform, 2nd EditionGuidelines, Patterns, and Code for End-to-End Java applications. http://java.sun.com/blueprints/guidelines/designing_enterprise_applications_2e/ [JWS] Ramesh Nagappan, Robert Skoczylas, et al. Developing Java Web Services: Architecting and Developing Java Web Services. Wiley, 2002 [CJP] Deepak Alur, John Crupi, Dan Malks. Core Security Patterns: Best practices and Design Strategies, Sun Microsystems, 2003. [EJBTier] Pravin V. Tulachan. Developing EJB 2.0 Components, Sun Microsystems, 2002. [WebTier] Marty Hall. More Servlets and Java Server Pages, Sun Microsystems, 2002. [EJBTier2] Kevin Boone. Applied Enterprise Java Beans Technology, Sun Microsystems, 2003. |
Категории