Flylib.com
Part IV: Applying Struts
Previous page
Table of content
Next page
< Day Day Up >
Chapter List
Chapter 19: Securing Struts Applications
Chapter 20: Testing Struts Applications
< Day Day Up >
Previous page
Table of content
Next page
Struts: The Complete Reference, 2nd Edition
ISBN: 0072263865
EAN: 2147483647
Year: 2003
Pages: 134
Authors:
James Holmes
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Introduction
Object Types, Predicates, and Basic Constraints
ORM Constraints
Editing Logical Models”Advanced Aspects
Change Propagation and Round Trip Engineering
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Identifying Project Schedule Risk
Managing Project Risk
Closing Projects
Conclusion
The CISSP and CAP Prep Guide: Platinum Edition
Access Control
Security Architecture and Design
Appendix A Answers to Assessment Questions
Appendix C The Information System Security Architecture Professional (ISSAP) Certification
Appendix F Security Control Catalog
Building Web Applications with UML (2nd Edition)
Events
Building Web Applications
Summary
Activities
Analysis Model Classes
Data Structures and Algorithms in Java
Classes and Objects
Iterators
Summary
Compression
Vocabulary
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 1. Set Up Bluetooth on Linux
Hack 10. Control XMMS with Bluetooth
Hack 16. Control Your Home Theater from Your Palm
Hack 82. Use Your Orinoco Card with Hermes AP
Hack 97. Calculate the Link Budget
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies