The Definitive Guide to Security in Jakarta EE Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Tijms, Arjan (VerfasserIn), Bais, Teo (VerfasserIn), Keil, Werner (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Berkeley, CA Apress 2022
Berkeley, CA
Ausgabe:1st ed. 2022
Schlagworte:
Online-Zugang:DE-1043
DE-1046
DE-Aug4
DE-1050
DE-573
DE-M347
DE-92
DE-1051
DE-898
DE-859
DE-860
DE-863
DE-862
DE-523
DE-355
DE-20
DE-706
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV048214892
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 220513s2022 xx o|||| 00||| eng d
020 |a 9781484279458  |c Online  |9 978-1-4842-7945-8 
024 7 |a 10.1007/978-1-4842-7945-8  |2 doi 
035 |a (ZDB-2-CWD)9781484279458 
035 |a (OCoLC)1317691877 
035 |a (DE-599)BVBBV048214892 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-355  |a DE-860  |a DE-1046  |a DE-1043  |a DE-Aug4  |a DE-898  |a DE-188  |a DE-523  |a DE-859  |a DE-863  |a DE-1050  |a DE-20  |a DE-1051  |a DE-862  |a DE-92  |a DE-573  |a DE-M347  |a DE-706 
082 0 |a 005.133  |2 23 
084 |a DAT 000  |2 stub 
100 1 |a Tijms, Arjan  |e Verfasser  |4 aut 
245 1 0 |a The Definitive Guide to Security in Jakarta EE  |b Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More  |c by Arjan Tijms, Teo Bais, Werner Keil 
250 |a 1st ed. 2022 
264 1 |a Berkeley, CA  |b Apress  |c 2022 
264 1 |a Berkeley, CA  |b Apress 
300 |a 1 Online-Ressource (XVII, 638 p. 82 illus) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
650 4 |a Java 
650 4 |a Programming Language 
650 4 |a Data and Information Security 
650 4 |a Java (Computer program language) 
650 4 |a Programming languages (Electronic computers) 
650 4 |a Data protection 
700 1 |a Bais, Teo  |4 aut 
700 1 |a Keil, Werner  |4 aut 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-1-4842-7944-1 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-1-4842-7946-5 
856 4 0 |u https://doi.org/10.1007/978-1-4842-7945-8  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-CWD 
940 1 |q ZDB-2-CWD_2022 
943 1 |a oai:aleph.bib-bvb.de:BVB01-033595685 
966 e |u https://doi.org/10.1007/978-1-4842-7945-8  |l DE-1043  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7945-8  |l DE-1046  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7945-8  |l DE-Aug4  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7945-8  |l DE-1050  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7945-8  |l DE-573  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7945-8  |l DE-M347  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7945-8  |l DE-92  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7945-8  |l DE-1051  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7945-8  |l DE-898  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7945-8  |l DE-859  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7945-8  |l DE-860  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7945-8  |l DE-863  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7945-8  |l DE-862  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7945-8  |l DE-523  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7945-8  |l DE-355  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7945-8  |l DE-20  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7945-8  |l DE-706  |p ZDB-2-CWD  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-UBR_katkey 6551706
_version_ 1822706774282600449
any_adam_object
author Tijms, Arjan
Bais, Teo
Keil, Werner
author_facet Tijms, Arjan
Bais, Teo
Keil, Werner
author_role aut
aut
aut
author_sort Tijms, Arjan
author_variant a t at
t b tb
w k wk
building Verbundindex
bvnumber BV048214892
classification_tum DAT 000
collection ZDB-2-CWD
ctrlnum (ZDB-2-CWD)9781484279458
(OCoLC)1317691877
(DE-599)BVBBV048214892
dewey-full 005.133
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.133
dewey-search 005.133
dewey-sort 15.133
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-1-4842-7945-8
edition 1st ed. 2022
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03472nam a2200685zc 4500</leader><controlfield tag="001">BV048214892</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220513s2022 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484279458</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4842-7945-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4842-7945-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-CWD)9781484279458</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1317691877</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048214892</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.133</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tijms, Arjan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The Definitive Guide to Security in Jakarta EE</subfield><subfield code="b">Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More</subfield><subfield code="c">by Arjan Tijms, Teo Bais, Werner Keil</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2022</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress</subfield><subfield code="c">2022</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVII, 638 p. 82 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Java</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programming Language</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Java (Computer program language)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programming languages (Electronic computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bais, Teo</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Keil, Werner</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-4842-7944-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-4842-7946-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4842-7945-8</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-CWD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-CWD_2022</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033595685</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7945-8</subfield><subfield code="l">DE-1043</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7945-8</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7945-8</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7945-8</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7945-8</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7945-8</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7945-8</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7945-8</subfield><subfield code="l">DE-1051</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7945-8</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7945-8</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7945-8</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7945-8</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7945-8</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7945-8</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7945-8</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7945-8</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7945-8</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV048214892
illustrated Not Illustrated
indexdate 2024-12-24T09:22:15Z
institution BVB
isbn 9781484279458
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-033595685
oclc_num 1317691877
open_access_boolean
owner DE-355
DE-BY-UBR
DE-860
DE-1046
DE-1043
DE-Aug4
DE-898
DE-BY-UBR
DE-188
DE-523
DE-859
DE-863
DE-BY-FWS
DE-1050
DE-20
DE-1051
DE-862
DE-BY-FWS
DE-92
DE-573
DE-M347
DE-706
owner_facet DE-355
DE-BY-UBR
DE-860
DE-1046
DE-1043
DE-Aug4
DE-898
DE-BY-UBR
DE-188
DE-523
DE-859
DE-863
DE-BY-FWS
DE-1050
DE-20
DE-1051
DE-862
DE-BY-FWS
DE-92
DE-573
DE-M347
DE-706
physical 1 Online-Ressource (XVII, 638 p. 82 illus)
psigel ZDB-2-CWD
ZDB-2-CWD_2022
publishDate 2022
publishDateSearch 2022
publishDateSort 2022
publisher Apress
record_format marc
spellingShingle Tijms, Arjan
Bais, Teo
Keil, Werner
The Definitive Guide to Security in Jakarta EE Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More
Java
Programming Language
Data and Information Security
Java (Computer program language)
Programming languages (Electronic computers)
Data protection
title The Definitive Guide to Security in Jakarta EE Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More
title_auth The Definitive Guide to Security in Jakarta EE Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More
title_exact_search The Definitive Guide to Security in Jakarta EE Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More
title_full The Definitive Guide to Security in Jakarta EE Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More by Arjan Tijms, Teo Bais, Werner Keil
title_fullStr The Definitive Guide to Security in Jakarta EE Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More by Arjan Tijms, Teo Bais, Werner Keil
title_full_unstemmed The Definitive Guide to Security in Jakarta EE Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More by Arjan Tijms, Teo Bais, Werner Keil
title_short The Definitive Guide to Security in Jakarta EE
title_sort the definitive guide to security in jakarta ee securing java based enterprise applications with jakarta security authorization authentication and more
title_sub Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More
topic Java
Programming Language
Data and Information Security
Java (Computer program language)
Programming languages (Electronic computers)
Data protection
topic_facet Java
Programming Language
Data and Information Security
Java (Computer program language)
Programming languages (Electronic computers)
Data protection
url https://doi.org/10.1007/978-1-4842-7945-8
work_keys_str_mv AT tijmsarjan thedefinitiveguidetosecurityinjakartaeesecuringjavabasedenterpriseapplicationswithjakartasecurityauthorizationauthenticationandmore
AT baisteo thedefinitiveguidetosecurityinjakartaeesecuringjavabasedenterpriseapplicationswithjakartasecurityauthorizationauthenticationandmore
AT keilwerner thedefinitiveguidetosecurityinjakartaeesecuringjavabasedenterpriseapplicationswithjakartasecurityauthorizationauthenticationandmore