-
Oracle Database Application Security: With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager 电子书下载
Focus on the security aspects of designing, building, and maintaining a secure Oracle Database application. Starting with data en ...
02-23 [ None ]
-
Spring Security 3.x Cookbook: Over 60 recipes to help you successfully safeguard your web applications with Spring Security 电子书下载
Packt Publishing, 2013. — 300 pp. — ISBN: 9781782167525Web applications are exposed to a variety of threats and vulnerabilities a ...
06-27 [ None ]
-
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers 电子书下载
This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, ...
07-10 [ None ]
-
Computer Network Security: Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedings 电子书下载
This volume contains papers presented at the Fourth International Workshop on Mathematical Methods, Models and Architectures for ...
09-06 [ None ]
-
Security Design Patterns 电子书下载
This Technical Guide provides a pattern-based security design methodology and a system of security design patterns. This methodol ...
04-10 [ None ]
-
Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century 电子书下载
Put quite simply, the twin impacts of globalization and environmental degradation pose new security dangers and concerns. In this ...
06-27 [ None ]
-
Spring Security 3.1 电子书下载
«Spring Security 3.1» is an incremental guide that will teach you how to protect your application from malicious users. You will ...
06-27 [ None ]
-
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, ... Networks and Telecommunications) 电子书下载
This book constitutes the refereed proceedings of the 5th International Conference on Mathematical Methods, Models, and Architec ...
09-06 [ None ]
-
Spring Security 3.x Cookbook 电子书下载
Web applications are exposed to a variety of threats and vulnerabilities at the authentication, authorization, service, and domai ...
06-27 [ None ]