78 Results for:"> museos de arte

  • Sort by: 

Using OpenID

01 May 2007

Learn more about OpenID, a decentralized, open source framework for user-centric digital identity. With OpenID, rather than managing all online accounts individually, users can manage their identity in one place ... Read More

CSRF attack: How hackers use trusted users for their exploits

By Karthik Poojary 14 Dec 2011

A CSRF attack is a serious Web security threat that, combined with XSS, can be lethal. Learn about the CSRF attack’s anatomy, along with mitigation methods. Read More

Introducing Apache Wicket

01 Jan 2008

This article approaches Apache Wicket by presenting the core concepts behind the framework, and moves to reinforce those concepts with an example leveraging some of Wicket's strengths. Read More

Cyber Reconnaissance, Surveillance and Defense

05 Oct 2015

In this excerpt of Cyber Reconnaissance, Surveillance and Defense, author Robert Shimonski describes commonly used mobile technology and how phone tracking works. Read More

How to Use Spring 3.0 In a Servlet Based Web Application

By Cameron McKenzie 02 Nov 2010

This tutorial will show you how to run a simple web based application that uses Spring 3 as an IoC container. Read More

Slingshot Yourself Into DataNucleus 2.1 and JPA 2.0

10 Nov 2010

Slingshot Yourself Into DataNucleus 2.1 and JPA 2.0 with this Tutorial for RDBMS Read More

Dependency Injection in Java EE 6: Conversations (Part 4)

13 May 2010

This series of articles introduces Contexts and Dependency Injection for Java EE (CDI), a key part of the Java EE 6 platform. Standardized via JSR 299, CDI is the de-facto API for comprehensive next-generation ... Read More

Part 5 - Integrating Java and Microsoft .NET

01 Feb 2007

Interoperability is one of the main promises of Web services. Web services are designed to be independent of the underlying operating system and programming language. In this article we will introduce basic web ... Read More

Are Java Web Applications Secure?

01 Jul 2008

One of the most extended belief about web applications is that most of them are insecure. This opinion is supported by statistics published by SANS [1] which show that almost half the vulnerabilities ... Read More

Introduction to Maverick

01 Aug 2003

This article will cover the code and experience in building an application using the Maverick framework. Read More