Cybersecurity

Understanding the big picture

(For more resources related to this topic, see here.) So we've got this thing for authentication and authorization. Let's see…

11 years ago

Defining the Application’s Policy File

(For more resources related to this topic, see here.) The AndroidManifest.xml file All Android applications need to have a manifest…

11 years ago

The DPM Feature Set

  Microsoft Data Protection Manager 2010 A practical step-by-step guide to planning deployment, installation, configuration, and troubleshooting of Data Protection…

13 years ago

Installing Data Protection Manager 2010

With the DPM upgrade you will face some of the same issues as with the installation such as what are…

13 years ago

Overview of Data Protection Manager 2010

  Microsoft Data Protection Manager 2010 A practical step-by-step guide to planning deployment, installation, configuration, and troubleshooting of Data Protection…

13 years ago

Designing Secure Java EE Applications in GlassFish

Security is an orthogonal concern for an application and we should assess it right from the start by reviewing the…

14 years ago

Securing our Applications using OpenSSO in GlassFish Security

An example of such system is integration between an online shopping system, the product provider who actually produces the goods,…

14 years ago

CISSP: Vulnerability and Penetration Testing for Access Control

IT components such as operating systems, application software, and even networks, have many vulnerabilities. These vulnerabilities are open to compromise…

14 years ago

Install GNOME-Shell on Ubuntu 9.10 “Karmic Koala”

Remember, these are development builds and preview snapshots, and are still in the early stages. While it appears to be…

14 years ago

Blocking Common Attacks using ModSecurity 2.5: Part 1

Web applications can be attacked from a number of different angles, which is what makes defending against them so difficult.…

14 years ago