Login | Register   
LinkedIn
Google+
Twitter
RSS Feed
Download our iPhone app
TODAY'S HEADLINES  |   ARTICLE ARCHIVE  |   FORUMS  |   TIP BANK
Browse DevX
Sign up for e-mail newsletters from DevX


advertisement

Security Zone Archives

Determine What Permissions the User Has on the System - 10/07/2016
Hybrid Integrations with Azure Logic Apps - 09/29/2016
The Most Often Ignored Agile Practice - 09/15/2016
Intelligent Load Balancing for a Microservices Application Architecture - 08/19/2016
Backup and Restore Using Amazon S3 API - 07/26/2016
Set up SSL Certificates in 5 Minutes Using Let's Encrypt - 07/05/2016
Examine the Strategic Value of APIs - 06/17/2016
Augmented Reality is Here - 05/10/2016
MSAL: New Authentication Library from Microsoft - 05/05/2016
Execute Code On-Demand with Azure Functions - 04/20/2016
Black box vs. White box Testing - 04/05/2016
Payments Made Easy with the New Visa API - 02/19/2016
Authenticate RESTful APIs with an OAuth Provider - 11/24/2015
Why TDD Is Key - 11/03/2015
IoT Requires Defense in Depth - 10/08/2015
Agile Programming Best Practices - 09/18/2015
Android Development Security Best Practices - 07/24/2015
Implementing AES Encryption in PHP - 06/04/2015
Hackathons 101: How to Hack Your Way to the Top - 05/20/2015
More Best Practices to Secure Your Web Server - 04/14/2015
Use Best Practices to Secure Your Web Server - 04/02/2015
Why APIs Are Critical for IoT Success - 03/31/2015
Lightweight OWIN OAuth2.0 Authorization Framework with IdentityServer3 - 03/26/2015
API Design Basics for Micro Service Oriented Architectures - 03/16/2015
Automate Your Infrastructure with Ansible - 03/03/2015
Getting Started with Project Management - 01/28/2015
Surveying the Web API Security Landscape - 12/18/2014
Thank Goodness for POODLE - 10/30/2014
Best Practices to Protect Big Data - 09/30/2014
Web Application Vulnerabilities Assessment: Introduction to ZAP - 09/01/2014
Internet of Things: The Roulette Game of the Decade - 08/12/2014
Taking a Stance on the Cost of Poor Quality Software - 08/07/2014
Video Surveillance: Enabling Remote Login and Displaying the Data - 07/02/2014
Video Surveillance: Configuring the Server - 06/05/2014
Dealing with Windows File Security Permission Rules for Copying Remote Files - 05/06/2014
Governance as a Dynamic Constraint Satisfaction Problem - 05/05/2014
Video Surveillance: Configuring the Client Machine - 04/29/2014
Create your own REST API Using OAuth Authentication - 02/26/2014
Architecting the Internet of Things with Intelligent Agents - 02/24/2014
OOP 2014: Martin Fowler’s Unexpected Pitch - 02/10/2014
Tips for Ensuring Secure Web Login - 01/31/2014
Secure Your Enterprise Perimeter Network with Active Directory Federation Services (AD FS) - 01/07/2014
Managing BYOD with the Cloud - 12/19/2013
What They’re Not Telling Us about the French Government’s Spoofed SSL Certificates - 12/12/2013
Has Verizon Figured out how to Secure the Internet of Things? - 11/20/2013
The Missing Link in Salesforce 1 - 11/19/2013
Give NSA People a Break - 09/23/2013
Time to Scrap Your PKI? - 09/10/2013
Privacy or Security: Choose One? - 08/15/2013
Bitcoin’s True Purpose - 08/13/2013
Sitemap
Thanks for your registration, follow us on our social networks to keep up-to-date