Skip to Main Content
Enterprise Java™ Security: Building Secure J2EE™ Applications
book

Enterprise Java™ Security: Building Secure J2EE™ Applications

by Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin
February 2004
Intermediate to advanced content levelIntermediate to advanced
608 pages
15h 11m
English
Addison-Wesley Professional
Content preview from Enterprise Java™ Security: Building Secure J2EE™ Applications

Appendix C. Technical Acronyms Used in This Book

A

ACID

atomicity, consistency, isolation, durability

ACM

Association for Computing Machinery

AES

Advanced Encryption Standard

API

application programming interface

APPC

Advanced Peer-to-Peer Communication

AS/400

Application System/400

ASCII

American Standard Code for Information Interchange

ASN

Abstract Syntax Notation

ASN.1

ASN 1

ATM

automatic teller machine

AWT

Abstract Windowing Toolkit

AuthML

Authentication Markup Language

B

B2B

business-to-business

B2C

business-to-consumer

BMP

bean-managed persistence

C

C14N

CanonicalizatioN

CA

Certificate Authority

CATT

Center for Advanced Technology in Telecommunications

CBC

cipher block chaining

CBR

call-by-reference

CBV

call-by-value

CD-ROM

Compact disk–read-only memory

CGI

Common Gateway Interface

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Jon Edney, William A. Arbaugh
Malware: Fighting Malicious Code

Malware: Fighting Malicious Code

Ed Skoudis, Lenny Zeltser

Publisher Resources

ISBN: 0321118898Purchase book