Securities on web services are very important because web services help us share information between distributed heterogeneous or homogeneous systems, allowing companies to achieve their business goals by sharing information, and it is precisely the information which must be protected from unwanted intruders.
In this article written by René Enríquez and Andrés Salazar, the author of RESTful Java Web Services Security, we will explore and implement each of the different security mechanisms and scenarios in which they can be used. You will be able to imagine more options to implement security in web services.
And as everything needs practice, you will go through a simple example of code, to learn the differences between authentication and authorization. Get ready for an interesting and useful topic.Read The Importance of Securing Web Services in full
In this article by Robert Galanakis, the author of Practical Maya Programming with Python, we will learn how to create your library, how to use an interpreter, create a function in your IDE, explore Maya and PyMEL, understand PyMEL data and math types.Read Introspecting Maya, Python, and PyMEL in full
This article created by Andre Dovgal, Gregor Noriskin, and Dmitri Olechko authors of Applied Architecture Patterns on the Microsoft Platform, Second Edition, presents an overview of the latest .NET version, and an assessment of the most notable namespaces in .NET based on their maturity, productivity, performance, and availabilityRead The .NET Framework Primer in full
In this article by Sandeep Kumar Patel, author of the book Developing Responsive Web Applications with AJAX and jQuery, we will learn how to integrate the YouTube API to embed a recommended video into a web application.
We will explore and learn to use the video-search feature for our web application. Users of the web application can get an instant review and key features of the product. This will help users in making a quick buying decision and increase the number of leads.Read Linking Dynamic Content from External Websites in full
In this article, written by Hrishikesh Vijay Karambelkar, the author of the book Scaling Apache Solr, we will learn about Apache Solr which runs on the underlying JVM in the J2EE container. While scaling Solr for processing more requests and indexing data, it becomes important that the underlying JVM is capable of scaling and is optimized well. Choosing the right JVM is an important factor. There are many JVMs available in the market today that can be considered such as Oracle Java HotSpot, BEA JRockit, and Open JDK (the list is available at http://en.wikipedia.org/wiki/List_of_Java_virtual_machines).Read Tuning Solr JVM and Container in full
In this article, by Cameron Buchanan, the author of Kali Linux CTF Blueprints, we will specifically focus on the following topics:
- Prerequisites for this article
- Network setup
- In-depth setup of a WEP network and dummy traffic
- In-depth setup of a WPA-2 network for handshake capture
- In-depth setup of vulnerable phones and devices
- In-depth setup of a secondary vulnerable phone scenario
- Exploit guide
This article is written by Jate Witayabundit, the author of Unity 4 Game Development Hotshot. Those who are familiar with HTML will probably have a good understanding of using a repetitive image for a background to reduce memory usage. Unity uses the same idea to create a graphic for the user interface, which will save a lot of memory and size for our game. In this article, we will take a look at the GUISkin feature, which is the main key to creating a custom skin in Unity.Read Customizing skin with GUISkin in full
In this article, Afshin Mehrabani, the author of the book MongoDB High Availability, has discussed about how you can implement sharding. We will connect different machines together and enable the sharding feature on a database and see the results using screenshots and pictures.Read Sharding in Action in full
In this article by Aske Olsson and Rasmus voss authors of Git Version Control Cookbook, we will cover configuration targets, querying the existing configuration, templates, a .git directory template, a few configuration examples, Git aliases, and the refspec exemplified.Read Configuration in full
This article by Nathan Kozyra, author of Mastering Concurrency in Go, tackles one of the Internet's most famous and esteemed challenges and attempt to solve it with core Go packages.Read C10K – A Non-blocking Web Server in Go in full
This article is written by Jean-Baptiste Onofré, the author of Learning Karaf Cellar. Open Software Gateway initiative (OSGi) has been "hidden" for a long time and reserved to middleware such as IDE or application servers. However, OSGi can be applied in a lot of different contexts and applications. An OSGi application needs an environment to run. Apache Karaf is a lightweight, powerful, and enterprise-ready OSGi container where you can deploy your applications. On a production system, especially a mission-critical platform, it makes sense to be able to manage a set of Apache Karaf containers and to spread the deployment (or provisioning) of applications to these different instances.Read Apache Karaf – Provisioning and Clusters in full
In this article, written by Rohit Menon, the author of the book Cloudera Administration Handbook, we will dive deeper into the two major components of Apache Hadoop—HDFS and MapReduce, and will cover the following topics:
Essentials of Hadoop Distributed File System
The read/write operational flow in HDFS
Exploring HDFS commands
Getting acquainted with MapReduce
This article by Eric Tiggeler, the author of Joomla! 3 Beginner's Guide Second Edition, will explore some simple, logical steps you can take to safeguard your site from hackers or data loss.
You've created a great site, customized its design, and added valuable content. That's an investment worth protecting. Rest assured, most Joomla sites will run for years without any hiccups. However, it's a good idea to take some precautions to minimize the risk of your website getting broken into. A few simple measures can make it a lot harder for malicious hackers to get access to your site and mess up its contents. Backing up data regularly can get you out of trouble fast if you run into hardware disasters (such as crashing hard drives) or software trouble (such as installing extensions that somehow mess up your existing site). Fortunately, these problems are rare, but it's definitely worth the little extra time investment needed to minimize risks.
How can you protect your site and how do you get your site up and running again when something has gone wrong? This article contains some essential tips and best practices to keep your site in perfect health (and save yourself some headaches too).Read Keeping the Site Secure in full