Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development life cycle. The authors examine security architectures and threat countermeasures for .NET, UNIX, Java, mobile, and Web environments.
Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development life cycle. The authors examine security architectures and threat countermeasures for .NET, UNIX, Java, mobile, and Web environments.
Security in Software Systems. Architecting Secure Software Systems. Constructing Secured and Safe C/UNIX Programs. Constructing Secured Systems in NET. Networking and Service-Oriented Architecture¿Based Security. Java Client-Side Security. Security in Mobile Applications. Security in Web-Facing Applications. Server-Side Java Security. Constructing Secured Web Services. Index.
Security in Software Systems. Architecting Secure Software Systems. Constructing Secured and Safe C/UNIX Programs. Constructing Secured Systems in NET. Networking and Service-Oriented Architecture¿Based Security. Java Client-Side Security. Security in Mobile Applications. Security in Web-Facing Applications. Server-Side Java Security. Constructing Secured Web Services. Index.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309