Core security patterns : best practices and strategies for J2EE, web services and identity management (Record no. 598)

000 -LEADER
fixed length control field 00584nam a2200181Ia 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 161214s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0131463071
Terms of availability (hbk)
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number STE
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Steel, Christopher
245 #0 - TITLE STATEMENT
Title Core security patterns : best practices and strategies for J2EE, web services and identity management
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New Jersey:
Name of publisher, distributor, etc Prentice Hall,
Date of publication, distribution, etc 2005
300 ## - PHYSICAL DESCRIPTION
Extent xlvi, 1041 p.;
Other physical details ill.:
Dimensions 24 cm.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Topical term or geographic name as entry element Java (Computer program language)
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Lai, Ray
Personal name Nagappan, Ramesh
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
952 ## - LOCATION AND ITEM INFORMATION (KOHA)
-- CR749Prentice Hall
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Source of acquisition Cost, normal purchase price Full call number Barcode Date last seen Date last borrowed Koha item type
          DAIICT DAIICT 2006-05-18 Book Plaza 0.00 005.8 STE 014069 0000-00-00 0000-00-00 Books

Powered by Koha