| 000 | 01567 a2200265 4500 | ||
|---|---|---|---|
| 003 | Nust | ||
| 005 | 20170207154028.0 | ||
| 010 | _a 99041138 | ||
| 020 | _a0130155926 | ||
| 035 | _a(DLC) 99041138 | ||
| 040 | _cNust | ||
| 082 | 0 | 0 | _a005.8 |
| 100 | _aPistoia, Marco | ||
| 245 | 0 | 0 |
_aJava 2 network security -(E-BOOK) _cMarco Pistoia ... [et al.]. |
| 250 | _a2nd ed. | ||
| 260 |
_aUpper Saddle River, N.J. : _bPrentice Hall, _cc1999. |
||
| 300 |
_axxi, 713 p. : _bill. ; _c24 cm. + _e1 computer disk (3 1/2 in.) |
||
| 440 | 0 | _aITSO networking series | |
| 505 | _aPart 1. Introduction to Java and Security (Page-1) Chapter 2. Attack and Defense(Page-35) Chapter 3. The New Java Security Model (Page-69) Chapter 4. The Java Virtual Machine (Page-109) Chapter 5. Class Files in Java 2 (Page-117) Chapter 6. The Class Loader and Class File Verifier (Page-145) Chapter 7. The Java 2 Security Manager (Page-187) Chapter 8. Security Configuration Files in the Java 2 SDK(Page-225) Chapter 9. Java 2 SDK Security Tools (Page-259) Chapter 10. Security APIs in Java 2 (Page-297) Chapter 11. The Java Plug-In (Page-359) Chapter 12. Java Gets Out of Its Box (Page-385) Chapter 13. Cryptography in Java 2 (Page-475) Chapter 14. Enterprise Java (Page-501) Chapter 15. Java and Firewalls – In and Out of the Net (Page-557) Chapter 16. Java and SSL(Page-603) Chapter 17. Epilogue(Page-635) | ||
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 650 | 0 | _aComputer security. | |
| 650 | 0 | _aJava (Computer program language) | |
| 651 | _aE-BOOK | ||
| 700 | 1 | _aPistoia, Marco. | |
| 942 |
_2ddc _cBK |
||
| 999 |
_c192019 _d192019 |
||