|
|
|
|
LEADER |
03525cam a2200673Ia 4500 |
001 |
26087 |
005 |
20150318220634.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
090106s2008 flu ob 001 0 eng d |
019 |
# |
# |
|a 308160540
|a 646784421
|a 666961145
|a 815753227
|
020 |
# |
# |
|a 9781420087857
|q (electronic bk.)
|
020 |
# |
# |
|a 1420087851
|q (electronic bk.)
|
020 |
# |
# |
|z 1420087843 (Cloth)
|
020 |
# |
# |
|z 9781420087840
|
020 |
# |
# |
|a 1281940887
|
020 |
# |
# |
|a 9781281940889
|
035 |
# |
# |
|a (OCoLC)297174715
|z (OCoLC)308160540
|z (OCoLC)646784421
|z (OCoLC)666961145
|z (OCoLC)815753227
|
040 |
# |
# |
|a N$T
|b eng
|c N$T
|d CRCPR
|d OCLCF
|d YDXCP
|d OCLCQ
|d MERUC
|d B24X7
|d OCLCQ
|d IL4I4
|d CEF
|d OCLCQ
|d E7B
|d CUS
|d CDX
|d OCLCQ
|d IDEBK
|e pn
|
049 |
# |
# |
|a MAIN
|
050 |
# |
4 |
|a QA76.9.A25
|b T34 2008eb
|
072 |
# |
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
# |
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
# |
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
# |
7 |
|a UR
|2 bicssc
|
082 |
0 |
4 |
|a 005.8
|2 22
|
100 |
1 |
# |
|a Talukder, Asoke K.
|
245 |
1 |
0 |
|a Architecting secure software systems
|c Asoke K. Talukder, Manish Chaitanya.
|h [electronic resource] /
|
260 |
# |
# |
|a Boca Raton :
|b CRC Press/Taylor & Francis Group,
|c 2008.
|
300 |
# |
# |
|a 1 online resource (1 volume)
|
336 |
# |
# |
|a text
|b txt
|2 rdacontent
|
337 |
# |
# |
|a computer
|b c
|2 rdamedia
|
338 |
# |
# |
|a online resource
|b cr
|2 rdacarrier
|
500 |
# |
# |
|a "An Auerbach book."
|
504 |
# |
# |
|a Includes bibliographical references and index.
|
505 |
0 |
# |
|a 1. Security in software systems -- 2. Architecting secure software systems -- 3. Constructing secured and safe C/UNIX programs -- 4. Constructing secured systems in .NET -- 5. Networking and SOA-based security -- 6. Java client-side security -- 7. Security in mobile applications -- 8. Security in web-facing applications -- 9. Server-side Java security -- 10. Constructing secured web services.
|
520 |
# |
# |
|a Once regarded as an afterthought, today, security is considered an integral part of software development that must start at the requirements gathering phase. This book covers various aspects of embedding security into an application as it is programmed, using any of the main platforms of today including UNIX, Java, and .NET.
|
588 |
0 |
# |
|a Print version record.
|
650 |
# |
0 |
|a Computer security.
|
650 |
# |
0 |
|a Computer architecture.
|
650 |
# |
0 |
|a Computer networks
|x Security measures.
|
650 |
# |
7 |
|a COMPUTERS
|x Security.
|x Internet
|2 bisacsh
|
650 |
# |
7 |
|a COMPUTERS
|x Security.
|x Networking
|2 bisacsh
|
650 |
# |
7 |
|a COMPUTERS
|x General.
|x Security
|2 bisacsh
|
650 |
# |
7 |
|a Computer architecture.
|0 (OCoLC)fst00872026
|2 fast
|
650 |
# |
7 |
|a Computer networks
|x Security measures.
|0 (OCoLC)fst00872341
|2 fast
|
650 |
# |
7 |
|a Computer security.
|0 (OCoLC)fst00872484
|2 fast
|
655 |
# |
4 |
|a Electronic books.
|
700 |
1 |
# |
|a Chaitanya, Manish.
|
776 |
0 |
8 |
|a Talukder, Asoke K.
|d Boca Raton : CRC Press/Taylor & Francis Group, 2008
|i Print version:
|t Architecting secure software systems.
|w (OCoLC)221164428
|w (DLC) 2008024408
|z 1420087843
|z 9781420087840
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=256988
|z View fulltext via EzAccess
|
938 |
# |
# |
|a Books 24x7
|b B247
|n bks00030510
|
938 |
# |
# |
|a CRC Press
|b CRCP
|n AUP00AU7843PDF
|
938 |
# |
# |
|a EBSCOhost
|b EBSC
|n 256988
|
938 |
# |
# |
|a YBP Library Services
|b YANK
|n 2918771
|
938 |
# |
# |
|a Coutts Information Services
|b COUT
|n 9529803
|
938 |
# |
# |
|a ebrary
|b EBRY
|n ebr10266111
|
938 |
# |
# |
|a Ingram Digital eBook Collection
|b IDEB
|n 194088
|