78 Results for:"> museos de arte
- Sort by:
Using OpenID
01 May 2007Learn more about OpenID, a decentralized, open source framework for user-centric digital identity. With OpenID, rather than managing all online accounts individually, users can manage their identity in one place ... Read More
CSRF attack: How hackers use trusted users for their exploits
14 Dec 2011A CSRF attack is a serious Web security threat that, combined with XSS, can be lethal. Learn about the CSRF attack’s anatomy, along with mitigation methods. Read More
Introducing Apache Wicket
01 Jan 2008This article approaches Apache Wicket by presenting the core concepts behind the framework, and moves to reinforce those concepts with an example leveraging some of Wicket's strengths. Read More
Cyber Reconnaissance, Surveillance and Defense
05 Oct 2015In this excerpt of Cyber Reconnaissance, Surveillance and Defense, author Robert Shimonski describes commonly used mobile technology and how phone tracking works. Read More
How to Use Spring 3.0 In a Servlet Based Web Application
02 Nov 2010This tutorial will show you how to run a simple web based application that uses Spring 3 as an IoC container. Read More
Slingshot Yourself Into DataNucleus 2.1 and JPA 2.0
10 Nov 2010Slingshot Yourself Into DataNucleus 2.1 and JPA 2.0 with this Tutorial for RDBMS Read More
Dependency Injection in Java EE 6: Conversations (Part 4)
13 May 2010This series of articles introduces Contexts and Dependency Injection for Java EE (CDI), a key part of the Java EE 6 platform. Standardized via JSR 299, CDI is the de-facto API for comprehensive next-generation ... Read More
Part 5 - Integrating Java and Microsoft .NET
01 Feb 2007Interoperability is one of the main promises of Web services. Web services are designed to be independent of the underlying operating system and programming language. In this article we will introduce basic web ... Read More
Are Java Web Applications Secure?
01 Jul 2008One of the most extended belief about web applications is that most of them are insecure. This opinion is supported by statistics published by SANS [1] which show that almost half the vulnerabilities ... Read More
Introduction to Maverick
01 Aug 2003This article will cover the code and experience in building an application using the Maverick framework. Read More