78 Results for:"> museos de arte
- Sort by:
Cryptography basics: Symmetric key encryption algorithms
28 Jan 2020Scrambling plaintext into ciphertext is essential to ensure data cannot be read or used by the wrong people. Learn the basics of symmetric key encryption algorithms here. Read More
An overview of ARM templates for Azure resource deployment
04 Dec 2018Azure Resource Manager templates streamline the way IT and development teams deploy cloud resources. To get started, grasp these key concepts around formatting, syntax and more. Read More
Detecting and Combating Malicious Email
18 Mar 2016In this excerpt of Detecting and Combating Malicious Email, authors Julie JCH Ryan and Cade Kamachi discuss the elements of an email structure and touch on how attackers can use these elements to trick unwitting ... Read More
Template based web design with JSF Facelets: ui:insert versus ui:include
20 Jul 2014When creating a web page template with JSF, a developer needs to know the difference between ui:insert and ui:include. They're actually quite different, but the similar sounding names can create confusion. Here's a... Read More
Turning a web page into a JSF 2.0 template with Facelets
19 Jul 2014How do you take a web page and turn it into a template using Facelets as the template engine? It takes some JSF, some HTML, maybe some CSS, and lots of JSF UI tags, but overall, it's an easy and simple process if ... Read More
JSF Tutorial: Completing the Ajax based Facelets application
31 Aug 2014If you're using JSF, you're probably using Facelets, and if you're creating modern web based applications, you'll likely want to use Ajax based request-response cycles. Here we conclude our tutorial on JavaServer ... Read More
JSR-286 development tutorial: Linking back to the portal with the PortletURL
27 Jul 2013In this JSR-286 development tutorial we look at the PortletURL and the challenge developers face when trying to link back to the portal, a portal page or a given portlet instance. Read More
Is there a way to automate API code generation?
26 Oct 2015As useful as APIs are, developers still struggle to create them due to lapses in documentation and specs. Brad Irby explores a tool that can help automate API code generation. Read More
Gmail phishing campaign uses real-time techniques to bypass 2FA
17 Jan 2017Researchers saw a Gmail phishing campaign in the wild using clever tricks to access accounts including a difficult 2FA bypass only possible in real time. Read More
How vulnerable is Microsoft IIS 7.5 to attacks?
09 Dec 2010While version 7.5 is more secure out of the box than past IIS releases, it doesn't guarantee 100% protection. Read More