Library Operating Hours for Sunday, 24 November 2024 : 8.00AM - 5.00PM
Home

Links

Last updated on 13 November 2014
Server Security
  1. . Cloud computing web-based applications that change the way you work and collaborate online. Indianapolis, Ind.: Que
  2. Mitchell, S. (2008). Create your own website. (4th ed.). Indianapolis, Ind.: Sams.
  3. Savitch, W. (2003). Java: an introduction to computer science and programming. (3rd ed.). Upper Saddle River , NJ: Prentice Hall
  4. Hopson, K.C. & Ingram, S.E.(1996). Developing professional java applets. Indianapolis, Ind.: Sams Publishing.
  5. Rodley, J. (1996). Writing hava applets: master the art of creating distributed internet programs. Coriolis Group Books.
  6. Deitel, P.J., Deitel, H.M. & Goldberg, A.B.(2004). Internet & World Wide Web : how to program. (3rd ed.). New Jersey: Deitel Pearson Prentice Hall. (TSDAS Digital Library : QA76.625 Dei)
  7. Eastlake, D.E. & Niles, K. (2003.) Secure XML: the new syntax for signatures and encryption. Boston: Addison-Wesley
  8. Hiroshi Maruyama, Kent Tamura & Naohiko Uramoto. (1999). XML and java: developing web applications. Addison Wesley.
  9. Kennedy, T & Slowinski, M. (2001). SMIL: Adding multimediato the web. United States: Sams Publishing
  10. Rosenburgh, J. & Remy, D.L.(2004). Securing web services wiht WS-security. United States: Sams Publishing
  11. Chen Li & Pahl, C. (2003). Security in the web services framework. Dublin, Ireland: Trinity College Dublin.
  12. Swiderski, F. & Snyder, W. (2004). Threat modeling. Redmomnt, Wash: Microsoft Press. Book 24x7 (OUM Digital Collection)
  13. Henry Chan, Raymond Lee, Tharam Dillon & Elizabeth Chang. (2002).E-commerce: fundamentals and applications. John Wiley
  14. Kaufeld, J. & Harvey, T. (2005). Developing eBay business tools for dummies. John Wiley.
  15. Christopher, K. & Thomas, T. (2000). A survey on intrusion detection systems. Austria: TUVienna
  16. Treese, G.W & Stewart, L.C.(1998). Designing systems for internet commerce. Reading MA: Addison Wesley Longman, Inc.
  17. Stalling, W. (2003). Network security essentials:applications and standards. (2nd ed). Prentice Hall. (TSDAS Digital Library : TK5105.59 Sta)

Copyright© Library, OUM 2013, All Rights Reserved
Latest updated: 23th July 2013

Get in touch with us