Smalltalk-80: bits of history, words of advice
Smalltalk-80: bits of history, words of advice
Smalltalk-80: the language and its implementation
Smalltalk-80: the language and its implementation
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Java servlet programming
Enterprise JavaBeans
Corba security: an introduction to safe computing with objects
Corba security: an introduction to safe computing with objects
Java Networking and Awt API SuperBible; With Cdrom
Java Networking and Awt API SuperBible; With Cdrom
Java 2 Network Security
Inside Java(TM) 2 Platform Security: Architecture, API Design, and Implementation
Inside Java(TM) 2 Platform Security: Architecture, API Design, and Implementation
Practical delegation for secure distributed object environments
Practical delegation for secure distributed object environments
Secure delegation for distributed object environments
COOTS'98 Proceedings of the 4th conference on USENIX Conference on Object-Oriented Technologies and Systems - Volume 4
Ubiquity and virtual home environment for legacy applications and services
ICCC '02 Proceedings of the 15th international conference on Computer communication
Middleware support for complex and distributed security services in multi-tier web applications
ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
Hi-index | 0.00 |
As e-business matures, companies require enterprise-scalable functionality for their corporate Internet and intranet environments. To support the expansion of their computing boundaries, businesses have embraced Web application servers. These servers support servlets, JavaServer PagesTM, and Enterprise JavaBeansTM technologies, providing simplified development and flexible deployment of Web-based applications. However, securing this malleable model presents a challenge. Successful companies recognize that their security infrastructures need to address the e-business challenge. They are aware of the types of attacks that malevolent entities can launch against their servers and can plan appropriate defenses.