|
|
|
|
LEADER |
00000nam a2200000 a 4500 |
003 |
AR-LpUFIB |
005 |
20250311170259.0 |
008 |
230201s2006 xxua r 000 0 eng d |
020 |
|
|
|a 0131463071
|
024 |
8 |
|
|a DIF-M3020
|b 3123
|z DIF002931
|
040 |
|
|
|a AR-LpUFIB
|b spa
|c AR-LpUFIB
|
100 |
1 |
|
|a Steel, Christopher
|
245 |
1 |
0 |
|a Core security patterns :
|b best practices and strategies for J2EE, Web services, and identity management
|
260 |
|
|
|a Upper Saddle River :
|b [S.n.],
|c c2006
|
300 |
|
|
|a xlvi, 1041 p. : il. ;
|c 25 cm.
|
490 |
0 |
|
|a Prentice Hall core series
|
505 |
0 |
|
|a Introduction -- Java Security Architecture and Technologies -- Web services Security and Identity Management -- Security Design Methodology, Patterns and Reality checks -- Design Strategies and Best Practices -- Putting it all together -- Personal Identification using smart cards and Biometrics
|
650 |
|
4 |
|a JAVA 2 PLATFORM ENTERPRISE EDITION - J2EE
|
650 |
|
4 |
|a SEGURIDAD Y PROTECCIÓN
|
700 |
1 |
|
|a Nagappan, Ramesh
|
700 |
1 |
|
|a Lai, Ray
|
942 |
|
|
|c BK
|
952 |
|
|
|0 0
|1 0
|4 0
|6 C20_STE
|7 0
|9 77599
|a DIF
|b DIF
|d 2010-12-22
|i DIF-03618
|l 0
|o C.2.0 STE
|p DIF-03618
|r 2025-03-11 17:02:59
|w 2025-03-11
|y BK
|
999 |
|
|
|c 52789
|d 52789
|