Books on the topic 'Web service security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Web service security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Bertino, Elisa, Lorenzo Martino, Federica Paci, and Anna Squicciarini. Security for Web Services and Service-Oriented Architectures. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-540-87742-4.
Full textLorenzo, Martino, Paci Federica, Squicciarini Anna, and SpringerLink (Online service), eds. Security for Web Services and Service-Oriented Architectures. Springer-Verlag Berlin Heidelberg, 2010.
Find full text1977-, Gutierrez Carlos, Fernandez-Medina Eduardo 1973-, and Piattini Mario 1966-, eds. Web services security development and architecture: Theoretical and practical issues. Information Science Reference, 2010.
Find full textWiehler, Gerhard. Mobility, Security und Web Services: Neue Technologien und Service-orientierte Architekturen für zukunftsweisende IT-Lösungen. Publicis Corporate Pub., 2004.
Find full textAxel, Bücker, and International Business Machines Corporation. International Technical Support Organization., eds. Understanding SOA security: Design and implementation. IBM, 2007.
Find full textZhang, Liang-Jie. Web services research for emerging applications: Discoveries and trends. Information Science Reference, 2010.
Find full textLiang-Jie, Zhang, ed. Web services research for emerging applications: Discoveries and trends. Information Science Reference, 2010.
Find full textMalik, Zaki. Trust Management for Service-Oriented Environments. Springer-Verlag US, 2009.
Find full textGuisnel, Jean. Guerres dans le cyberespace: Services secrets et Internet. La Découverte/Poche, 1997.
Find full text1954-, Murphy Richard, ed. Enterprise Web services security. Charles River Media, 2005.
Find full textInc, ebrary, ed. Oracle Web Services Manager: Securing your web services. Packt Pub., 2008.
Find full textInternational Business Machines Corporation. International Technical Support Organization, ed. Securing CICS Web services. IBM, International Technical Support Organization, 2008.
Find full textIEEE International Conference on e-Technology, e-Commerce, and e-Service (2005 Hong Kong, China). The 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Service: Proceedings : Lam Woo International Conference Centre, Hong Kong Baptist University, Hong Kong, China, March 29-April 1, 2005. IEEE Computer Society, 2005.
Find full textF, Ransome James, ed. Cloud computing: Implementation, management, and security. CRC Press, 2010.
Find full textRittinghouse, John W. Cloud computing: Implementation, management, and security. CRC Press, 2010.
Find full textLaurence, Moroney, ed. Expert Web services security in the .NET platform. Apress, 2005.
Find full textRittinghouse, John W. Cloud computing: Implementation, management, and security. CRC Press, 2010.
Find full textPanos, Periorellis, ed. Securing Web services: Practical usage of standards and specifications. Information Science Reference, 2007.
Find full textMike, Andrews, ed. How to break Web software: Functional and security testing of Web applications and Web services. Addison-Wesley, 2006.
Find full text1951-, Khosrowpour Mehdi, ed. Web technologies for commerce and services online. Information Science Reference, 2008.
Find full text1965-, Whittaker James A., ed. How to break Web software: Functional and security testing of Web applications and Web services. Addison-Wesley, 2006.
Find full textBertino, Elisa, Lorenzo Martino, and Federica Paci. Security for Web Services and Service-Oriented Architectures. Springer, 2010.
Find full textBertino, Elisa, Lorenzo Martino, Federica Paci, and Anna Squicciarini. Security for Web Services and Service-Oriented Architectures. Springer, 2014.
Find full textMicrosoft Corporation. Web Service Security: Scenarios, Patterns, and Implementation Guidance for Web Services Enhancements (WSE) 3.0 (Patterns & Practices). Microsoft Press, 2006.
Find full textFederal Cloud Computing The Definitive Guide For Cloud Service Providers. Syngress Publishing, 2012.
Find full textWiehler, Gerhard. Mobility, Security and Web Services: Technologies and Service-Oriented Architectures for a New Era of IT Solutions. Publicis MCD Werbeagentur GmbH, 2007.
Find full textMobility, Security and Web Services: Technologies and Service-oriented Architectures for a New Era of IT Solutions. Wiley-VCH, 2004.
Find full textWiehler, G. Mobility, Security und Web Services: Technologies and Service-Oriented Architectures for a New Era of IT Solutions. Wiley-VCH, 2004.
Find full textRedbooks, IBM. Understanding SOA Security Design and Implementation: February 2007. Vervante, 2007.
Find full textOxley, Alan. Security Risks in Social Media Technologies: Safe Practices in Public Service Applications. Chandos Publishing, 2013.
Find full textOxley, Alan. Security Risks in Social Media Technologies: Safe Practices in Public Service Applications. Elsevier Science & Technology, 2013.
Find full textDalpiaz, Fabiano, Achim Brucker, Paolo Giorgini, Per Håkon Meland, and Erkuden Rios. Secure and Trustworthy Service Composition: The Aniketos Approach. Springer, 2014.
Find full textDalpiaz, Fabiano, Achim Brucker, Paolo Giorgini, Per Håkon Meland, and Erkuden Rios. Secure and Trustworthy Service Composition: The Aniketos Approach. Springer London, Limited, 2014.
Find full textMartinelli, Steve. Identity, authentication, and access management in OpenStack: Implementing and deploying Keystone, OpenStack's identity service. 2015.
Find full textBouguettaya, Athman, and Zaki Malik. Trust Management for Service-Oriented Environments. Springer, 2010.
Find full textBouguettaya, Athman, and Zaki Malik. Trust Management for Service-Oriented Environments. Springer, 2014.
Find full textJr, Curtis Franklin, and Brian Chee. Securing the Cloud: Security Strategies for the Ubiquitous Data Center. Taylor & Francis Group, 2019.
Find full textJr, Curtis Franklin, and Brian Chee. Securing the Cloud: Security Strategies for the Ubiquitous Data Center. Auerbach Publishers, Incorporated, 2019.
Find full textSecuring the Cloud: Security Strategies for the Ubiquitous Data Center. Auerbach Publishers, Incorporated, 2023.
Find full textJr, Curtis Franklin, and Brian Chee. Securing the Cloud: Security Strategies for the Ubiquitous Data Center. Auerbach Publishers, Incorporated, 2019.
Find full textZhou, Jianying, Ehud Gudes, Jie Zhang, and Nurit Gal-Oz. Trust Management VIII: 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014, Proceedings. Springer, 2016.
Find full textZhou, Jianying, Ehud Gudes, Jie Zhang, and Nurit Gal-Oz. Trust Management VIII: 8th IFIP WG 11. 11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014, Proceedings. Springer, 2014.
Find full textVehent, Julien. Securing DevOps: Security in the Cloud. Manning Publications, 2018.
Find full text