Features of CloudFlare
(For more resources related to this topic, see here.)
Top 5 features you need to know about
Here we will go over the various security, performance,...
Understanding the big picture
(For more resources related to this topic, see here.)
So we've got this thing for authentication and authorization. Let's see who is responsible and what...
Defining the Application’s Policy File
(For more resources related to this topic, see here.)
The AndroidManifest.xml file
All Android applications need to have a manifest file. This file has to be...
Getting Started with Spring Security
(For more resources related to this topic, see here.)
Hello Spring Security
Although Spring Security can be extremely difficult to configure, the creators of the product...
Wireshark: Working with Packet Streams
(For more resources related to this topic, see here.)
Working with Packet Streams
While working on network capture, there can be multiple instances of network activities...
The DPM Feature Set
Microsoft Data Protection Manager 2010
A practical step-by-step guide to planning deployment, installation, configuration, and troubleshooting of Data Protection Manager 2010 with this book and...
Installing Data Protection Manager 2010
With the DPM upgrade you will face some of the same issues as with the installation such as what are the prerequisites? is your...
Overview of Data Protection Manager 2010
Microsoft Data Protection Manager 2010
A practical step-by-step guide to planning deployment, installation, configuration, and troubleshooting of Data Protection Manager 2010
Read more about this book
(For...
Spring Security 3: Tips and Tricks
Spring Security 3
Make your web applications impenetrable.
Implement authentication and authorization of users.
Integrate Spring Security 3 with common external security providers.
Packed...
Designing Secure Java EE Applications in GlassFish
Security is an orthogonal concern for an application and we should assess it right from the start by reviewing the analysis we receive from...