Home Security Page 3

Security

To help you stay up to date with developments in web security, Packt Hub provides news and expert insights. We work with thought leaders to bring you the best advice about topics like malware analysis and penetration testing.

Opening up to OpenID with Spring Security

1
(For more resources on Spring, see here.) The promising world of OpenID The promise of OpenID as a technology is to allow users on the web...

Designing Secure Java EE Applications in GlassFish

0
Security is an orthogonal concern for an application and we should assess it right from the start by reviewing the analysis we receive from...

Developing Secure Java EE Applications in GlassFish

0
In this article series, we will develop a secure Java EE application based on Java EE and GlassFish capabilities. In course of the article,...

Spring Security 3: Tips and Tricks

0
  Spring Security 3 Make your web applications impenetrable. Implement authentication and authorization of users. Integrate Spring Security 3 with common external security providers. Packed...

BackTrack 4: Target scoping

0
What is target scoping? Target Scoping is defined as an empirical process for gathering target assessment requirements and characterizing each of its parameters to generate...

BackTrack 4: Penetration testing methodologies

0
A robust penetration testing methodology needs a roadmap. This will provide practical ideas and proven practices which should be handled with great care in...

FAQs on BackTrack 4

0
BackTrack 4: Assuring Security by Penetration Testing Master the art of penetration testing with BackTrack         Q: Which version of Backtrack is to be...

Tips and Tricks on BackTrack 4

0
  BackTrack 4: Assuring Security by Penetration Testing Master the art of penetration testing with BackTrack         Read more about this book       (For more resources on this subject, see...

Overview of Data Protection Manager 2010

0
  Microsoft Data Protection Manager 2010 A practical step-by-step guide to planning deployment, installation, configuration, and troubleshooting of Data Protection Manager 2010         Read more about this book       (For...

Installing Data Protection Manager 2010

0
With the DPM upgrade you will face some of the same issues as with the installation such as what are the prerequisites? is your...

Must Read in Security

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

0
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...

Win-KeX Version 2.0 from Kali Linux

Interviews