Opening up to OpenID with Spring Security
(For more resources on Spring, see here.)
The promising world of OpenID
The promise of OpenID as a technology is to allow users on the web...
Designing Secure Java EE Applications in GlassFish
Security is an orthogonal concern for an application and we should assess it right from the start by reviewing the analysis we receive from...
Developing Secure Java EE Applications in GlassFish
In this article series, we will develop a secure Java EE application based on Java EE and GlassFish capabilities. In course of the article,...
Spring Security 3: Tips and Tricks
Spring Security 3
Make your web applications impenetrable.
Implement authentication and authorization of users.
Integrate Spring Security 3 with common external security providers.
Packed...
BackTrack 4: Target scoping
What is target scoping?
Target Scoping is defined as an empirical process for gathering target assessment requirements and characterizing each of its parameters to generate...
BackTrack 4: Penetration testing methodologies
A robust penetration testing methodology needs a roadmap. This will provide practical ideas and proven practices which should be handled with great care in...
FAQs on BackTrack 4
BackTrack 4: Assuring Security by Penetration Testing
Master the art of penetration testing with BackTrack
Q: Which version of Backtrack is to be...
Tips and Tricks on BackTrack 4
BackTrack 4: Assuring Security by Penetration Testing
Master the art of penetration testing with BackTrack
Read more about this book
(For more resources on this subject, see...
Overview of Data Protection Manager 2010
Microsoft Data Protection Manager 2010
A practical step-by-step guide to planning deployment, installation, configuration, and troubleshooting of Data Protection Manager 2010
Read more about this book
(For...
Installing Data Protection Manager 2010
With the DPM upgrade you will face some of the same issues as with the installation such as what are the prerequisites? is your...