Books on the topic 'Java security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Java security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Loukides, Mike, and Debra Cameron, eds. Java Security. 2nd ed. Beijing: O'Reilly, 2001.
Find full textDaniel, Somerfield, ed. Professional Java security. Birmingham, UK ; Chicago, IL: Wrox Press, 2001.
Find full textS, MacGregor Robert, ed. Java network security. Upper Saddle River, N.J: Prentice Hall PTR, 1998.
Find full textCorporation, International Business Machines, ed. Java 2 network security. [S.l.]: IBM Corp., 1999.
Find full textDebbabi, Mourad. Embedded Java security: Security for mobile devices. London: Springer, 2010.
Find full textMourad, Debbabi, ed. Embedded Java security: Security for mobile devices. London: Springer, 2007.
Find full textCoffin, David. Expert Oracle and Java Security. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3832-4.
Full text1958-, Taylor Art, and Layman Randy, eds. Hacking exposed J2EE & Java: Developing secure applications with Java technology. New York: McGraw-Hill/Osborne, 2002.
Find full textBuege, Brian. Hacking exposed J2EE & Java: Developing secure applications with Java technology. New York: McGraw-Hill/Osborne, 2002.
Find full textAttali, Isabelle, and Thomas Jensen, eds. Java on Smart Cards:Programming and Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45165-x.
Full textMarco, Pistoia, ed. Enterprise Java security: Building secure J2EE applications. Boston: Addison-Wesley, 2004.
Find full textExpert Oracle and Java security: Programming secure Oracle database applications with Java. [New York]: Apress, 2011.
Find full textHook, David. Beginning Cryptography with Java. New York: John Wiley & Sons, Ltd., 2007.
Find full textVirden, Roy John. An approach to mobile agent security in Java. Monterey, Calif: Naval Postgraduate School, 1998.
Find full textGary, Ellison, and Dageforde Mary, eds. Inside Java 2 platform security: Architecture, API design, and implementation. 2nd ed. Boston, MA: Addison-Wesley, 2004.
Find full textGalbreath, Nick. Cryptography for Internet and database applications: Developing secret and public key techniques with Java. Indianapolis, Ind: Wiley Pub., 2002.
Find full textRamesh, Nagappan, and Lai Ray, eds. Core security patterns: Best practices and strategies for J2EE, Web services and identity management. Upper Saddle River, NJ: Prentice Hall Professional Technical Reference, 2005.
Find full textBhargav, Abhay. Secure Java: For web application development. Boca Raton, FL: CRC Press, 2011.
Find full text1963-, Felten Edward, and McGraw Gary 1966-, eds. Securing Java: Getting down to business with mobile code. 2nd ed. New York: Wiley Computer Pub., 1999.
Find full textCryptography for Internet and database applications: Developing secret and public key techniques with Java. Indianapolis, Ind: Wiley Pub., 2002.
Find full textEdwards, Nigel. High security web servers and gateways. Palo Alto, CA: Hewlett-Packard Laboratories, Technical Publications Department, 1996.
Find full textSiliceo, Omar. IBM WebSphere application server V7.0 security: Secure your WebSphere applications with Java EE and JAAS security standards. Birmingham, UK: Packt Enterprise Pub., 2011.
Find full textHolappa, Jarkko. Security threats and requirements for Java-based applications in the networked home environment. Espoo [Finland]: Technical Research Centre of Finland, 2001.
Find full textInc, ebrary, ed. GlassFish security: Secure your GlassFish installation, web applications, EJB applications, application client module, and web services using Java EE and GlassFish security measures. Birmingham, U.K: Packt Open Source, 2010.
Find full textCarnegie-Mellon University. CERT Coordination Center, ed. The CERT Oracle secure coding standard for Java. Upper Saddle River, NJ: Addison-Wesley, 2012.
Find full textJustin, Gehtland, ed. Rails for Java developers. Raleigh, N.C: Pragmatic Programmer, 2007.
Find full text1935-, Flinn Donald, and Beznosov Konstantin, eds. Enterprise security with EJB and CORBA. New York: J. Wiley & Sons, 2001.
Find full textJ2EE security for servlets, EJBs and Web services: Applying theory and standards to practice. Upper Saddle River, N.J: Prentice Hall PTR, 2004.
Find full textGanguli, Madhushree. Java Security (Networking). Muska & Lipman/Premier-Trade, 2002.
Find full textHelton, Rich, and Johennie Helton. Java Security Solutions. Wiley & Sons, Incorporated, John, 2007.
Find full textEmbedded Java Security. London: Springer London, 2007. http://dx.doi.org/10.1007/978-1-84628-711-4.
Full textPilipchuk, Denis, and Denis Piliptchouk. Java vs . Net Security. O'Reilly Media, Incorporated, 2004.
Find full textMedia, Inc O'Reilly. Java Web Services Security. O'Reilly Media, Incorporated, 2001.
Find full textDebbabi, Mourad, Chamseddine Talhi, Sami Zhioua, and Mohamed Saleh. Embedded Java Security: Security for Mobile Devices. Springer, 2006.
Find full textDebbabi, Mourad, Chamseddine Talhi, Sami Zhioua, and Mohamed Saleh. Embedded Java Security: Security for Mobile Devices. Springer London, Limited, 2007.
Find full textHelton. Java Application Security Architecture-apdf. Wiley & Sons, Incorporated, John, 2003.
Find full textEnriquez, Rene, and Andres Salazar C. RESTful Java Web Services Security. Packt Publishing, Limited, 2014.
Find full text