CONTENTS: 1. Information security risk management imperatives and opportunities 2. Information security risk management defined 3. Information security risk management standards 4. A survey of available information security risk management methods and tools 5. Methodologies examples : COBIT and OCTAVE 6. Risk management issues and organization specifics 7. Assessing organization an…
Part I: Creating Enterprise Applications Chapter 1: Introducing Java Platform, Enterprise Edition Chapter 2: Using Web Containers Chapter 3: Writing Your First Servlet Chapter 4: Using JSPs to Display Content Chapter 5: Maintaining State Using Sessions Chapter 6: Using the Expression Language in JSPs Chapter 7: Using the Java Standard Tag Library Chapter 8: Writing Custom Tag and Function Libra…
null