Book Descr iption Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the
Advanced Operating Systems and Kernel Applications: Techniques and Technologies Yair Wiseman Bar-Ilan University, Israel Song Jiang Wayne State University, USA Hershey • New York InformatIon Contents Chapter 1 Kernel Stack Overflows Elimina Chapter
The Diameter base protocol is intended to provide an Authentication, Authorization and Accounting (AAA) framework for applications such as network access or IP mobility. Diameter is also intended to work in both local Authentication, Authorization &
Beginning: Microsoft Visual C# 2008 0 About the Authors 9 Credits 10 Contents 12 Introduction 30 Who This Book Is For 30 How This Book Is Structured 31 What You Need to Use This Book 34 Conventions 34 Source Code 35 Errata 35 p2p.wrox.com 36 Part I:
最新官方资料 Contents About this book ............................................................................................................... 11 Notices and trademarks ...............................................................................
Available via WWW ............................................................................................................. 14 Documentation Available Commercially..................................................................................
Practical Mod Perl Copyright Preface What You Need to Know Who This Book Is For How This Book Is Organized Reference Sections Filesystem Conventions Apache and Perl Versions Typographic Conventions Command Interpreter Program (Shell) Conven
Packages javax.annotation This package defines the common annotations. javax.annotation.security This package contains the security common annotations. javax.annotation.sql javax.context javax.decorator javax.ejb The javax.ejb package contains the E
本资料约500多页 内容目录如下: 数据建模(经典推荐) Contents Foreword Acknowledgments About the Author Chapter 1 Introduction Why Is There a Need for This Book? Who Can Benefit from Reading This Book? The Need for Universal Data Models A Holistic Approach to Systems Devel