|
|
|
|
|
Spring Security 3.x Cookbook
Secure your Java applications against online threats by learning the powerful mechanisms of Spring Security. Presented as a cookbook full of recipes, this book covers a wide range of vulnerabilities and scenarios.
Overview
-
Learn about all the mandatory security measures for modern day applications using...
| | Programming Data Driven Web Applications with ASP.NETProgramming Data-Driven Web Applications with ASP.NET provides readers with a solid understanding of ASP.NET and how to effectively integrate databases with their Web sites. The key to making information instantly available on the Web is integrating the Web site and the database to work as one piece. The authors teach this using ASP.NET,... | | Web Services SecurityMinimize security risks in your system by successfully rolling out secure Web Services with help from this exceptional guide. Web Services Security covers everything network security professionals need to know, including details on Web Services architecture, SOAP, UDDI, WSDL, XML Signature, XML Encryption, SAML, XACML, XKMS, and... |
|
|
Pro ADO.NET Data Services: Working with RESTful Data (Expert's Voice in .Net)Pro ADO.NET Data Services: Working with RESTful Data is aimed at developers interested in taking advantage of the new REST–style data services that ADO.NET Data Services (formerly code–named Astoria) provides. The book shows how to incorporate ADO.NET Data Services into a wide range of common environments including BizTalk,... | | Real World XML, Second EditionSteven Holzner's friendly, easy-to-read style has turned this book (formerly known as Inside XML) into the leading reference on XML. Unlike other XML books, this one is packed with hundreds of real-world examples, fully tested and ready to use!
Holzner teaches you XML like no other author can, covering... | | Mastering Web Services SecurityQuickly learn how to build a secure Web services system using available programming tools, models, and specifications
Web services promise to simplify business programming and to improve interoperability, but they won’t deliver on these promises without effective security. Written by the leading security experts in the field, this... |
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |