O'Reilly logo

J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice by Pankaj Kumar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

References

[Anderson, 2001] Anderson, Ross J. , Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley Computer Publishing, 2001.

[Viega, 2002a] Viega, John and Gary McGraw , Building Secure Software: How to Avoid the Security Problems the Right Way, Addison-Wesley, 2002.

[Tanenbaum, 1996] Tanenbaum, Andrew S. , Computer Networks, Third Edition, Prentice Hall, Inc., 1996.

[Scheneir, 1996] Schneier, Bruce , Applied Cryptography, Second Edition: protocols, algorithms, and source code in C, John Wiley & Sons, Inc., 1996.

[Rescorla, 2001] Rescorla, Eric , SSL and TLS: designing and building secure systems, Addison Wesley, 2001.

[Howard, 2002] Howard, Michael and David LeBlanc , Writing Secure Code, Microsoft Press, 2002. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required