Home Security Page 70

Security

To help you stay up to date with developments in web security, Packt Hub provides news and expert insights. We work with thought leaders to bring you the best advice about topics like malware analysis and penetration testing.

Tips and Tricks on BackTrack 4

0
  BackTrack 4: Assuring Security by Penetration Testing Master the art of penetration testing with BackTrack         Read more about this book       (For more resources on this subject, see...

BackTrack 4: Penetration testing methodologies

0
A robust penetration testing methodology needs a roadmap. This will provide practical ideas and proven practices which should be handled with great care in...

BackTrack 4: Target scoping

0
What is target scoping? Target Scoping is defined as an empirical process for gathering target assessment requirements and characterizing each of its parameters to generate...

Spring Security 3: Tips and Tricks

0
  Spring Security 3 Make your web applications impenetrable. Implement authentication and authorization of users. Integrate Spring Security 3 with common external security providers. Packed...

Designing Secure Java EE Applications in GlassFish

0
Security is an orthogonal concern for an application and we should assess it right from the start by reviewing the analysis we receive from...

Developing Secure Java EE Applications in GlassFish

0
In this article series, we will develop a secure Java EE application based on Java EE and GlassFish capabilities. In course of the article,...

Opening up to OpenID with Spring Security

1
(For more resources on Spring, see here.) The promising world of OpenID The promise of OpenID as a technology is to allow users on the web...

Encode your password with Spring Security 3

0
This article by Peter Mularien is an excerpt from the book Spring Security 3. In this article, we will: Examine different methods of configuring password encoding Understand...

Migration to Spring Security 3

0
(For more resources on Spring, see here.) During the course of this article we will: Review important enhancements in Spring Security 3 Understand configuration changes required in...

Securing our Applications using OpenSSO in GlassFish Security

0
An example of such system is integration between an online shopping system, the product provider who actually produces the goods, the insurance company that...

Must Read in Security

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

0
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...

Win-KeX Version 2.0 from Kali Linux

Interviews