Narrow Search
Last searches

Results for *

Displaying results 1 to 6 of 6.

  1. Core security patterns
    best practices and strategies for J2EE , web services, and identity management ; [a patterns catalog that includes twentythree new patterns for building end-to-end security ; security design methodology, patterns, best practices, reality checks, and defensive strategies ; applied techniques for Web services security, identy management, service provisioning, and personal identification ; comprehensive security guide to using J2SE, J2EE, J2ME, and Java Card]
    Published: 2006
    Publisher:  Prentice Hall PTR, Upper Saddle River, NJ [u.a.]

    Hochschule für Angewandte Wissenschaften Hamburg, Hochschulinformations- und Bibliotheksservice (HIBS), Fachbibliothek Technik, Wirtschaft, Informatik
    Dat 346 JAV 293
    No inter-library loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    T 06 B 2601
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Ilmenau
    INF ST 250 J35 S813
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 0131463071
    Other identifier:
    2005020502
    RVK Categories: ST 250
    Subjects: Java (Computer program language); Computer security
    Scope: XLVI, 1041 S, Ill., graph. Darst
  2. Norway
    information security
    Published: 2006
    Publisher:  OECD, Paris

    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    1 A 598235
    Unlimited inter-library loan, copies and loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    T 06 B 6510
    Unlimited inter-library loan, copies and loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    B 344388
    Unlimited inter-library loan, copies and loan
    ifo Institut für Wirtschaftsforschung an der Universität München, Bibliothek
    06/97
    No inter-library loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Staatsbibliothek zu Berlin
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9264025502
    RVK Categories: MS 1190 ; ST 277
    Series: OECD reviews of risk management policies
    Subjects: Datensicherheit; Norwegen; Computer security; Computer networks; Data protection; Information resources management; ICT; Computerbeveiliging
    Scope: 130 S.
    Notes:

    Zsfassung in franz. Sprache

    Enth. 5 Beitr

    Literaturverz. S. 91 - 96

  3. Norway
    information security
    Published: 2006
    Publisher:  OECD, Paris

    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Staatsbibliothek zu Berlin
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9264025502
    RVK Categories: MS 1190 ; ST 277
    Series: OECD reviews of risk management policies
    Subjects: Datensicherheit; Norwegen; Computer security; Computer networks; Data protection; Information resources management; ICT; Computerbeveiliging
    Scope: 130 S.
    Notes:

    Zsfassung in franz. Sprache

    Enth. 5 Beitr

    Literaturverz. S. 91 - 96

  4. La fortaleza digital
    Author: Brown, Dan
    Published: 2006
    Publisher:  Umbriel, Barcelona

    La supercomputadora de la Agencia de Seguridad Nacional se encuentra con un código el cual no puede descifrar. El subdirector de la agencia llama a la hermosa criptógrafa Susan Fletcher. La única pista para romper ese código parece estar en el... more

    Ibero-Amerikanisches Institut Preußischer Kulturbesitz, Bibliothek
    Unlimited inter-library loan, copies and loan

     

    La supercomputadora de la Agencia de Seguridad Nacional se encuentra con un código el cual no puede descifrar. El subdirector de la agencia llama a la hermosa criptógrafa Susan Fletcher. La única pista para romper ese código parece estar en el cadáver de un hombre fallecido en Espańa, donde ha sido enviado el prometido de Susan, David Becker. Mientras David intenta hallar la clave y sobrevivir a la persecución de un metódico e implacable asesino en las calles de Sevilla, Susan se enfrentará a su propio drama en las desoladas instalaciones de máxima seguridad de la Agencia, durante una larga noche en la que la mentira y el asesinato acechan tras cada puerta The supercomputer of the National Security Agency has encountered a code which it can not decipher. The deputy director of the agency calls the beautiful cryptographer Susan Fletcher. The only way to break the code seems to be in the body of a man who died in Spain. Susan's fiance, David Becker, is sent to Spain to investigate. While David tries to find the key and survive a methodical and ruthless murderer on the streets of Seville, Susan will face her own drama in the isolated maximum security facilities of the Agency, during a long night where lies and murder lurk behind every door

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
  5. Core security patterns
    best practices and strategies for J2EE(TM), Web services, and identity management
    Published: 2006
    Publisher:  Pearson Education, London ; Prentice Hall PTR, Upper Saddle River, N.J.

    Technische Universität Chemnitz, Universitätsbibliothek
    Unlimited inter-library loan, copies and loan
    Sächsische Landesbibliothek - Staats- und Universitätsbibliothek Dresden
    Unlimited inter-library loan, copies and loan
    Hochschule für Angewandte Wissenschaften Hamburg, Hochschulinformations- und Bibliotheksservice (HIBS), Fachbibliothek Technik, Wirtschaft, Informatik
    Dat 346 JAV 293
    No inter-library loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    T 06 B 2601
    Unlimited inter-library loan, copies and loan
    Duale Hochschule Baden-Württemberg Heidenheim, Bibliothek
    Z 020/ Stec
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Ilmenau
    INF ST 250 J35 S813
    Unlimited inter-library loan, copies and loan
    Karlsruher Institut für Technologie, KIT-Bibliothek
    2005 A 12571
    Unlimited inter-library loan, copies and loan
    Universität Stuttgart, Institut für Kommunikationsnetze und Rechnersysteme, Bibliothek
    Inf 100
    No loan of volumes, only paper copies will be sent
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 0131463071
    Other identifier:
    9780131463073
    2005020502
    RVK Categories: ST 250
    Series: Prentice Hall core series
    Subjects: Java (Computer program language); Computer security
    Scope: xlvi, 1041 S.
    Notes:

    Formerly CIP

  6. La fortaleza digital
    Author: Brown, Dan
    Published: 2006
    Publisher:  Umbriel, Barcelona

    La supercomputadora de la Agencia de Seguridad Nacional se encuentra con un código el cual no puede descifrar. El subdirector de la agencia llama a la hermosa criptógrafa Susan Fletcher. La única pista para romper ese código parece estar en el... more

    Ibero-Amerikanisches Institut Preußischer Kulturbesitz, Bibliothek
    A 19 / 12609
    Unlimited inter-library loan, copies and loan

     

    La supercomputadora de la Agencia de Seguridad Nacional se encuentra con un código el cual no puede descifrar. El subdirector de la agencia llama a la hermosa criptógrafa Susan Fletcher. La única pista para romper ese código parece estar en el cadáver de un hombre fallecido en Espańa, donde ha sido enviado el prometido de Susan, David Becker. Mientras David intenta hallar la clave y sobrevivir a la persecución de un metódico e implacable asesino en las calles de Sevilla, Susan se enfrentará a su propio drama en las desoladas instalaciones de máxima seguridad de la Agencia, durante una larga noche en la que la mentira y el asesinato acechan tras cada puerta The supercomputer of the National Security Agency has encountered a code which it can not decipher. The deputy director of the agency calls the beautiful cryptographer Susan Fletcher. The only way to break the code seems to be in the body of a man who died in Spain. Susan's fiance, David Becker, is sent to Spain to investigate. While David tries to find the key and survive a methodical and ruthless murderer on the streets of Seville, Susan will face her own drama in the isolated maximum security facilities of the Agency, during a long night where lies and murder lurk behind every door

     

    Export to reference management software   RIS file
      BibTeX file
    Content information