To see the other types of publications on this topic, follow the link: Java security.

Books on the topic 'Java security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Java security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Sethi, Harpreet. Java security. Cincinnati, Ohio: Premier Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Loukides, Mike, and Debra Cameron, eds. Java Security. 2nd ed. Beijing: O'Reilly, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

1963-, Felten Edward, ed. Java security. New York: Wiley, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Oaks, Scott. Java security. Cambridge: O'Reilly, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Inc, NetLibrary, ed. Java security. Sebastopol, CA: O'Reilly, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Daniel, Somerfield, ed. Professional Java security. Birmingham, UK ; Chicago, IL: Wrox Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

S, MacGregor Robert, ed. Java network security. Upper Saddle River, N.J: Prentice Hall PTR, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Corporation, International Business Machines, ed. Java 2 network security. [S.l.]: IBM Corp., 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Debbabi, Mourad. Embedded Java security: Security for mobile devices. London: Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mourad, Debbabi, ed. Embedded Java security: Security for mobile devices. London: Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Coffin, David. Expert Oracle and Java Security. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3832-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

1958-, Taylor Art, and Layman Randy, eds. Hacking exposed J2EE & Java: Developing secure applications with Java technology. New York: McGraw-Hill/Osborne, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Buege, Brian. Hacking exposed J2EE & Java: Developing secure applications with Java technology. New York: McGraw-Hill/Osborne, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Attali, Isabelle, and Thomas Jensen, eds. Java on Smart Cards:Programming and Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45165-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Marco, Pistoia, ed. Enterprise Java security: Building secure J2EE applications. Boston: Addison-Wesley, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Expert Oracle and Java security: Programming secure Oracle database applications with Java. [New York]: Apress, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Hook, David. Beginning Cryptography with Java. New York: John Wiley & Sons, Ltd., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Virden, Roy John. An approach to mobile agent security in Java. Monterey, Calif: Naval Postgraduate School, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Gary, Ellison, and Dageforde Mary, eds. Inside Java 2 platform security: Architecture, API design, and implementation. 2nd ed. Boston, MA: Addison-Wesley, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Galbreath, Nick. Cryptography for Internet and database applications: Developing secret and public key techniques with Java. Indianapolis, Ind: Wiley Pub., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Ramesh, Nagappan, and Lai Ray, eds. Core security patterns: Best practices and strategies for J2EE, Web services and identity management. Upper Saddle River, NJ: Prentice Hall Professional Technical Reference, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Bhargav, Abhay. Secure Java: For web application development. Boca Raton, FL: CRC Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Introduction to cryptography with Java applets. Boston: Jones and Bartlett, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

1963-, Felten Edward, and McGraw Gary 1966-, eds. Securing Java: Getting down to business with mobile code. 2nd ed. New York: Wiley Computer Pub., 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Cryptography for Internet and database applications: Developing secret and public key techniques with Java. Indianapolis, Ind: Wiley Pub., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Edwards, Nigel. High security web servers and gateways. Palo Alto, CA: Hewlett-Packard Laboratories, Technical Publications Department, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Siliceo, Omar. IBM WebSphere application server V7.0 security: Secure your WebSphere applications with Java EE and JAAS security standards. Birmingham, UK: Packt Enterprise Pub., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Holappa, Jarkko. Security threats and requirements for Java-based applications in the networked home environment. Espoo [Finland]: Technical Research Centre of Finland, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Inc, ebrary, ed. GlassFish security: Secure your GlassFish installation, web applications, EJB applications, application client module, and web services using Java EE and GlassFish security measures. Birmingham, U.K: Packt Open Source, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Carnegie-Mellon University. CERT Coordination Center, ed. The CERT Oracle secure coding standard for Java. Upper Saddle River, NJ: Addison-Wesley, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Justin, Gehtland, ed. Rails for Java developers. Raleigh, N.C: Pragmatic Programmer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

1935-, Flinn Donald, and Beznosov Konstantin, eds. Enterprise security with EJB and CORBA. New York: J. Wiley & Sons, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

J2EE security for servlets, EJBs and Web services: Applying theory and standards to practice. Upper Saddle River, N.J: Prentice Hall PTR, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Oaks, Scott. Java Security. O'Reilly Media, Incorporated, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Neumann. Java Security. SIGS, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Oaks, Scott. Java Security. O'Reilly, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Ganguli, Madhushree. Java Security (Networking). Muska & Lipman/Premier-Trade, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Wiley. Professional Java Security. Wiley & Sons, Incorporated, John, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Helton, Rich, and Johennie Helton. Java Security Solutions. Wiley & Sons, Incorporated, John, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Java & Internet Security. iUniverse, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Embedded Java Security. London: Springer London, 2007. http://dx.doi.org/10.1007/978-1-84628-711-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Java Security Handbook. Sams, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Java Security Solutions. Wiley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Pilipchuk, Denis, and Denis Piliptchouk. Java vs . Net Security. O'Reilly Media, Incorporated, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Media, Inc O'Reilly. Java Web Services Security. O'Reilly Media, Incorporated, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Debbabi, Mourad, Chamseddine Talhi, Sami Zhioua, and Mohamed Saleh. Embedded Java Security: Security for Mobile Devices. Springer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Debbabi, Mourad, Chamseddine Talhi, Sami Zhioua, and Mohamed Saleh. Embedded Java Security: Security for Mobile Devices. Springer London, Limited, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Wear, William. Java Security on the Web. Pearson Education, Limited, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Helton. Java Application Security Architecture-apdf. Wiley & Sons, Incorporated, John, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Enriquez, Rene, and Andres Salazar C. RESTful Java Web Services Security. Packt Publishing, Limited, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography