01326 a2200265 4500003000500000005001700005020002000022040000900042082001000051100001700061245009700078260004900175300003300224490004200257505044700299650002200746650003400768650004500802650004600847651001100893700002200904942001200926999001900938952010300957Nust20170207154030.0 a1-58053-295-0 ; cNust0 a005.81 aLang, Ulrich00aDeveloping secure distributed applications with CORBA(E-BOOK)cUlrich Lang, Rudolf Schreiner aBoston ;aLondon :bArtech House,ccop. 2002 axvii, 311s. :bill. ;c23 cm0 aArtech House computer security series aPart I: CORBA Security. Introduction to CORBA — Why CORBA? The Object Management Group (OMG). The Object Management Architecture (OMA). The Common Object Request Broker Architecture (CORBA). How does it all work together? Creating and Running an Example Application. The Security Basics — What is Security? Why Security? Aspects of Security within CORBA. Security Management. Threats, Vulnerabilities, Countermeasures. Middleware Security 0aComputer security 0aCORBA (Computer architecture) 0aDistributed databasesxSecurity measures 0aDistributed operating systems (Computers) aE-BOOK1 aSchreiner, Rudolf 2ddccBK c192136d192136 00102ddc40708NFICaMCSbMCSd2016-12-12l0o005.8 LANpMCSEB-1290r2016-12-08w2016-12-12yBK