-
481
Hacking exposed J2EE and Java developing secure applications with Java technology
Foilsithe / Cruthaithe 2002LEABHAR -
482
Know your enemy revealing the security tools, tactics, and motives of the blackhat community
Foilsithe / Cruthaithe 2002LEABHAR -
483
Security architecture design, deployment and operations
Foilsithe / Cruthaithe 2001Table of contents
LEABHAR -
484
-
485
-
486
-
487
-
488
-
489
-
490