80,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in über 4 Wochen
payback
40 °P sammeln
  • Broschiertes Buch

Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development life cycle. The authors examine security architectures and threat countermeasures for .NET, UNIX, Java, mobile, and Web environments.

Produktbeschreibung
Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development life cycle. The authors examine security architectures and threat countermeasures for .NET, UNIX, Java, mobile, and Web environments.
Autorenporträt
Talukder, Asoke K.; Chaitanya, Manish