Flylib.com
List of Sidebars
Previous page
Table of content
Chapter 3: Application Architecture, Security, and Caching
Preventing Replay Attacks
Cached Data Invalidation in a Distributed Cache
Chapter 4: Struts-Based Application Architecture
Dynamic URL Generation
Chapter 5: Presentation Tier Design and Implementation
Pattern Discovery and Documentation
Chapter 7: Business Tier Design and Implementation
Optimization Note
Moving Forward
Previous page
Table of content
Practical J2EE Application Architecture
ISBN: 0072227117
EAN: 2147483647
Year: 2003
Pages: 111
Authors:
Nadir Gulzar
BUY ON AMAZON
Beginning Cryptography with Java
Asymmetric Key Cryptography
Distinguished Names and Certificates
CMS and S/MIME
Appendix A Solutions to Exercises
Appendix C Using the Bouncy Castle API for Elliptic Curve
Adobe After Effects 7.0 Studio Techniques
Organization
Selections: The Key to Compositing
Conclusion
32 Bits per Channel
Backlighting, Flares, Light Volume
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity I
IDS and IPS Architecture
Snort
Data Correlation
Policy and Procedures
Programming Microsoft ASP.NET 3.5
Real-World Data Access
ASP.NET Security
Creating New ASP.NET Controls
Working with Images in ASP.NET
HTTP Handlers and Modules
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Introduction to Network Security
Introduction to the CIPS 5.x Command-Line Interface
Summary
Public Key Infrastructure (PKI)
Security Contexts
User Interfaces in C#: Windows Forms and Custom Controls
Control Class Basics
MDI Interfaces and Workspaces
Dynamic User Interface
GDI+ Controls
Help and Application-Embedded Support
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies