Testing Code Security
The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and... | | | | JAVA 2 Network Security (2nd Edition) The complete insider's guide to securing Java 2 enterprise applications!
- Building secure enterprise applications with Java 2!
- Integrating Java 2 into your overall security strategy
- Detailed coverage for managers, developers, netadmins, and security specialists
- ...
|