Tutorial by Topics: security

In order to keep our images up to date for the security patches, we need to know from which base image we depend
Typical database backed, annotation base spring security setup. configureGlobal() configure the auth object. The later two SQLs may be optional. configure() method tells spring mvc how to authenticate request some url we do not need to authenticate others will redirect to /login if not yet...
Security practices in Java can be separated into two broad, vaguely defined categories; Java platform security, and secure Java programming. Java platform security practices deal with managing the security and integrity of the JVM. It includes such topics as managing JCE providers and security poli...
We can secure the data in Hadoop using different methods. Each method has its own advantages. We can also combine more than one method for better result. This topic covers the advantages & limitations of each method 1. Kerberos is a network authentication protocol: a. Advantage: Authentic...
Security in iOS is related to data security, transport security, code security, etc
When setting up voters to use with sonata-admin, there are a few pitfalls, the steps shown here should get you up and running, so that sonata properly takes the voters into account, when rendering the edit, show and delete buttons, when building the sidebar, when running the batch actions, basically...
This is a collection of common JavaScript security issues, like XSS and eval injection. This collection also contains how to mitigate these security issues.
Oracle Real Application Security was introduced in Oracle 12c. It summarize many Security Topics like User-Role-Model, Access Control, Application vs. Database, End-User-Security or Row- and Column Level Security

Page 2 of 2