Developing Secure Java EE Applications in GlassFish
In this article series, we will develop a secure Java EE application based on Java EE and GlassFish capabilities. In course of the article,...
Spring Security 3: Tips and Tricks
Spring Security 3
Make your web applications impenetrable.
Implement authentication and authorization of users.
Integrate Spring Security 3 with common external security providers.
Packed...
Overview of Data Protection Manager 2010
Microsoft Data Protection Manager 2010
A practical step-by-step guide to planning deployment, installation, configuration, and troubleshooting of Data Protection Manager 2010
Read more about this book
(For...
Installing Data Protection Manager 2010
With the DPM upgrade you will face some of the same issues as with the installation such as what are the prerequisites? is your...
The DPM Feature Set
Microsoft Data Protection Manager 2010
A practical step-by-step guide to planning deployment, installation, configuration, and troubleshooting of Data Protection Manager 2010 with this book and...
Wireshark: Working with Packet Streams
(For more resources related to this topic, see here.)
Working with Packet Streams
While working on network capture, there can be multiple instances of network activities...
Getting Started with Spring Security
(For more resources related to this topic, see here.)
Hello Spring Security
Although Spring Security can be extremely difficult to configure, the creators of the product...
Defining the Application’s Policy File
(For more resources related to this topic, see here.)
The AndroidManifest.xml file
All Android applications need to have a manifest file. This file has to be...
Understanding the big picture
(For more resources related to this topic, see here.)
So we've got this thing for authentication and authorization. Let's see who is responsible and what...
Features of CloudFlare
(For more resources related to this topic, see here.)
Top 5 features you need to know about
Here we will go over the various security, performance,...