78 Results for:"> museos de arte

  • Sort by: 

Cryptography basics: Symmetric key encryption algorithms

By Sharon Shea, Pearson Education 28 Jan 2020

Scrambling plaintext into ciphertext is essential to ensure data cannot be read or used by the wrong people. Learn the basics of symmetric key encryption algorithms here. Read More

An overview of ARM templates for Azure resource deployment

By Kurt Marko 04 Dec 2018

Azure Resource Manager templates streamline the way IT and development teams deploy cloud resources. To get started, grasp these key concepts around formatting, syntax and more. Read More

Detecting and Combating Malicious Email

18 Mar 2016

In this excerpt of Detecting and Combating Malicious Email, authors Julie JCH Ryan and Cade Kamachi discuss the elements of an email structure and touch on how attackers can use these elements to trick unwitting ... Read More

Template based web design with JSF Facelets: ui:insert versus ui:include

By Cameron McKenzie 20 Jul 2014

When creating a web page template with JSF, a developer needs to know the difference between ui:insert and ui:include. They're actually quite different, but the similar sounding names can create confusion. Here's a... Read More

Turning a web page into a JSF 2.0 template with Facelets

By Cameron McKenzie 19 Jul 2014

How do you take a web page and turn it into a template using Facelets as the template engine? It takes some JSF, some HTML, maybe some CSS, and lots of JSF UI tags, but overall, it's an easy and simple process if ... Read More

JSF Tutorial: Completing the Ajax based Facelets application

By Cameron McKenzie 31 Aug 2014

If you're using JSF, you're probably using Facelets, and if you're creating modern web based applications, you'll likely want to use Ajax based request-response cycles. Here we conclude our tutorial on JavaServer ... Read More

JSR-286 development tutorial: Linking back to the portal with the PortletURL

27 Jul 2013

In this JSR-286 development tutorial we look at the PortletURL and the challenge developers face when trying to link back to the portal, a portal page or a given portlet instance. Read More

Is there a way to automate API code generation?

By Brad Irby 26 Oct 2015

As useful as APIs are, developers still struggle to create them due to lapses in documentation and specs. Brad Irby explores a tool that can help automate API code generation. Read More

Gmail phishing campaign uses real-time techniques to bypass 2FA

By Michael Heller 17 Jan 2017

Researchers saw a Gmail phishing campaign in the wild using clever tricks to access accounts including a difficult 2FA bypass only possible in real time. Read More

How vulnerable is Microsoft IIS 7.5 to attacks?

By Kevin Beaver 09 Dec 2010

While version 7.5 is more secure out of the box than past IIS releases, it doesn't guarantee 100% protection. Read More