References


[LiGong] Li Gong. "Java Security Architecture," in "Java™ 2 SDK, Standard Edition Documentation Version 1.4.2." Sun Microsystems, 2003. http://java.sun.com/j2se/1.4.2/docs/guide/security/spec/security-spec.doc1.html and http://java.sun.com/j2se/1.4.2/docs/guide/security/spec/security-spec.doc2.html

[J2EE-WS-Blueprints] J2EE Blueprints: Designing Web Services with the J2EE Platform, 2nd EditionGuidelines, Patterns, and Code for Java Web services. http://java.sun.com/blueprints/guidelines/designing_webservices/

[J2EE-Blueprints] J2EE Blueprints: Designing Enterprise Applications with the J2EE Platform, 2nd EditionGuidelines, Patterns, and Code for End-to-End Java applications. http://java.sun.com/blueprints/guidelines/designing_enterprise_applications_2e/

[JWS] Ramesh Nagappan, Robert Skoczylas, et al. Developing Java Web Services: Architecting and Developing Java Web Services. Wiley, 2002

[CJP] Deepak Alur, John Crupi, Dan Malks. Core Security Patterns: Best practices and Design Strategies, Sun Microsystems, 2003.

[EJBTier] Pravin V. Tulachan. Developing EJB 2.0 Components, Sun Microsystems, 2002.

[WebTier] Marty Hall. More Servlets and Java Server Pages, Sun Microsystems, 2002.

[EJBTier2] Kevin Boone. Applied Enterprise Java Beans Technology, Sun Microsystems, 2003.




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net