Appendix D. Sources Used in This Book

 <  Day Day Up  >    

This book draws and expands on material from the following sources:

¢ M. Hondo, N. Nagaratnam, and A. Nadalin. "Securing Web Services," IBM Systems Journal 41, 2, 2002.

¢ L. Koved, A. Nadalin, D. Deal, and T. Lawson. "The evolution of Java security," IBM Systems Journal 37, 3, 1998.

¢ L. Koved, A. Nadalin, N. Nagaratnam, M. Pistoia, and T. Shrader. "The Security Challenges for Enterprise Java in an e-Business Environment," IBM Systems Journal 40, 1, 2001.

¢ A. Nadalin and N. Nagaratnam. "J2EE Security: A WebSphere 4.0 Perspective," IBM DeveloperToolbox Technical Magazine . October 2001. http://www.ibm.com/developerworks.

¢ A. Nadalin, T. Shrader, and B. Rich. "Java Cryptography Part 1: Encryption and Decryption," IBM DeveloperToolbox Technical Magazine . December 1999. http://www.ibm.com/developerworks.

¢ A. Nadalin, T. Shrader, and B. Rich. "Java Cryptography Part II: Key Generation and Management," IBM DeveloperToolbox Technical Magazine . March 2000. http://www.ibm.com/developerworks.

¢ A. Nadalin, T. Shrader, and B. Rich. "Java Cryptography Part III: Implementing Your Own Provider," IBM DeveloperToolbox Technical Magazine . June 2000. http://www.ibm.com/developerworks.

¢ A. Nadalin, T. Shrader, and B. Rich. "Java Cryptography Part IV: JCE Export Considerations," IBM DeveloperToolbox Technical Magazine . September 2000. http://www.ibm.com/developerworks.

¢ M. Pistoia, D. F. Reller, D. Gupta, M. Nagnur, and A. K. Ramani. Java 2 Network Security . (Upper Saddle River, NJ: Prentice-Hall, 1999).

¢ T. Shrader, A. Nadalin, and B. Rich. "When Cryptographic Messages Go Bad," IBM DeveloperToolbox Technical Magazine . June 2000. http://www.ibm.com/developerworks.

 <  Day Day Up  >    


Enterprise Java Security. Building Secure J2EE Applications
Enterprise Javaв„ў Security: Building Secure J2EEв„ў Applications
ISBN: 0321118898
EAN: 2147483647
Year: 2004
Pages: 164

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net