02.06.2013 Views

analisi e gestione della sicurezza di una complessa applicazione ...

analisi e gestione della sicurezza di una complessa applicazione ...

analisi e gestione della sicurezza di una complessa applicazione ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

BIBLIOGRAFIA<br />

G. Naccarato, M. Valeri, “C# guida alla programmazione”, E<strong>di</strong>zioni Master, 2004<br />

Atzeni, Ceri, Paraboschi, Torlone, “Basi <strong>di</strong> dati”, McGrawHill, 1999<br />

Spalazzi L, Slide corso “Ingegneria del software” Unified Modeling Language, Ancona<br />

2004/05.<br />

M. MacDonald, “Beginning ASP.NET 2.0 in C# 2005: From Novice to Professional”, Apress,<br />

2006<br />

G. Andrew Duthie, “Microsoft ASP.NET Programming with Microsoft Visual C# .NET<br />

Version 2003 Step by Step”, Microsoft Press, 2003<br />

M. Howard, D. LeBlanc, “Writing secure code (Second E<strong>di</strong>tion)”, Microsoft Press, 2003<br />

E. Gamma, R. Helm, R. Johnson, J. Vlissides, “Design Patterns: Elements of Reusable<br />

Object-Oriented Software”, Ad<strong>di</strong>son-Wesley Publishing Company, 1998

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!