| Tags | security |
|---|---|
| Ranking | #972766 in MvnRepository (See Top Artifacts) |
| Version ▼ | Vulnerabilities | Repository | Usages | Date | |
|---|---|---|---|---|---|
1.0.x | 1.0.0-RC1 | Central |
0
| Dec 23, 2005 | |
0.9.x | 0.9.0 | Central |
0
| Dec 23, 2005 | |
0.8.x | 0.8.3 | Central |
0
| Nov 08, 2005 | |
| 0.8.2 | Central |
0
| Nov 08, 2005 | ||
| 0.8.1.1 | Central |
0
| Nov 08, 2005 | ||
| 0.8.1 | Central |
0
| Nov 08, 2005 | ||
| 0.8.0 | Central |
0
| Nov 08, 2005 | ||
0.7.x | 0.7.1 | Central |
0
| Nov 08, 2005 | |
| 0.7.0 | Central |
0
| Nov 24, 2005 |
Related Books
| Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) (2025) by Snoke, Nancy | |
| Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) (2024) by Chawdhury, Tarun Kumar, Banerjee, Joyanta, Gupta, Vipul, Poddar, Debopam | |
| The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More (2022) by Tijms, Arjan, Bais, Teo, Keil, Werner | |
| Java Security (2nd Edition) (2001) by Oaks, Scott |