| License | Apache 2.0 |
|---|---|
| Tags | serversecurityconfigframeworkapache |
| Ranking | #22922 in MvnRepository (See Top Artifacts) |
| Used By | 21 artifacts |
| Version ▼ | Vulnerabilities | Repository | Usages | Date | |
|---|---|---|---|---|---|
3.0.x | 3.0.1 | Central | May 23, 2013 | ||
| 3.0.0 | Central | Jul 03, 2012 | |||
| 3.0-M1 | Central | Jun 09, 2010 | |||
| 3.0-beta-1 | Central | Nov 07, 2011 | |||
2.2.x | 2.2.1 | Central | Dec 03, 2010 | ||
| 2.2 | Central | Dec 08, 2009 | |||
2.1.x | 2.1.8 | Central | Dec 21, 2011 | ||
| 2.1.7 | Central | Nov 24, 2010 | |||
| 2.1.6 | Central | Jun 22, 2010 | |||
| 2.1.5 | Central | Apr 06, 2010 | |||
| 2.1.4 | Central | Mar 29, 2009 | |||
| 2.1.3 | Central | Sep 16, 2008 | |||
| 2.1.2 | Central | Aug 05, 2008 | |||
| 2.1.1 | Central | Apr 28, 2008 | |||
| 2.1 | Central | Feb 18, 2008 |
Related Books
| Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) (2025) by Snoke, Nancy | |
| Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) (2024) by Chawdhury, Tarun Kumar, Banerjee, Joyanta, Gupta, Vipul, Poddar, Debopam | |
| The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More (2022) by Tijms, Arjan, Bais, Teo, Keil, Werner | |
| Apache Geronimo: Enterprise Java Development and Deployment (2012) by Mulder, Aaron | |
| Apache Geronimo 2.1: Quick Reference (2009) by Chillakuru,Vamsavardhana Reddy | |
| Pro Apache Geronimo (2006) by Kumar, Kishore | |
| Java Security (2nd Edition) (2001) by Oaks, Scott | |
| Professional Apache Geronimo (Wrox Professional Guides) by Jeff Genender |