| 000 | 01286cam a22003138a 4500 | ||
|---|---|---|---|
| 005 | 20250930121452.0 | ||
| 008 | 050718s2005 njua bi 001 0 eng | ||
| 020 |
_a0131463071 (pbk. : alk. paper) _cRM226.76 |
||
| 039 | 9 |
_a200604261458 _bariff _c200602201219 _dariff _c200602131132 _didah _c200602131131 _didah _y02-13-2006 _zidah |
|
| 090 | _aQA76.73.J3S74 | ||
| 090 |
_aQA76.73.J3 _bS74 |
||
| 100 | 1 |
_aSteel, Christopher, _d1968- |
|
| 245 | 1 | 0 |
_aCore security patterns : _bbest practices and strategies for J2EE, Web services and identity management / _cChristopher Steel, Ramesh Nagappan, Ray Lai |
| 260 |
_aUpper Saddle River, NJ : _bPrentice Hall Professional Technical Reference, _c2005 |
||
| 300 |
_axlvi, 1041 p. : _bill. ; _c25 cm. |
||
| 504 | _aIncludes bibliographical references and index | ||
| 650 | 0 |
_aJava (Computer program language) _960204 |
|
| 650 | 0 | _aComputer security | |
| 700 | 1 | _aNagappan, Ramesh | |
| 700 | 1 | _aLai, Ray | |
| 856 | 4 | 1 |
_3Table of contents _uhttp://www.loc.gov/catdir/toc/ecip0516/2005020502.html |
| 907 |
_a.b13672162 _b2021-05-28 _c2019-11-12 |
||
| 942 |
_c01 _n0 _kQA76.73.J3S74 |
||
| 914 | _avtls003321170 | ||
| 990 | _amaa | ||
| 991 | _aJabatan Sains Komputer | ||
| 998 |
_at _b2006-01-02 _cm _da _feng _gnju _y0 _z.b13672162 |
||
| 999 |
_c365872 _d365872 |
||