In this article by Jonathan Williamson, we will discuss about baking in blender. This article will cover all the essentials required to get started with baking in blender. We will discuss about the various types of baking and their uses which includes full render, ambient occlusion, shadow baking, normals, textures and also displacement.Read Learn Baking in Blender in full
The telecommunication and network security domain deals with the security of voice and data communications through local area, wide area, and remote access networking. The focus is to understand the networking models such as Open Systems Interconnect (OSI) and TCP/IP models, which are the most important models that follow a layered approach to networking, as well as the security mechanisms for Internet, Intranet, and Extranet in terms of firewalls, routers, and intrusion detection and protection systems.
The telecommunication and network security domain is one of the 10 domains of the Certified Information Systems Security Professional (CISSP) exam.
In this article by M.L.Srinivasan, we will discuss the following topics:
- Different protocols that are in transport layer, network/internet layer, and link layer in the TCP/IP model
- Some threats and vulnerabilities that are prevalent to such protocols
- Common attacks and possible countermeasures
- Important technologies and the security issues associated with them
In this article by Jacob Gube, we will look at:
- The $() and $$() function
- Selecting HTML elements with pseudo-class selectors
- Selecting HTML elements based on their attributes
So let’s get on with it...Read Selecting DOM Elements using MooTools 1.2: Part 1 in full
In this article by Markus Feilner, we will discuss the basic networking concepts of OpenVPN, and also have a brief look at the configuration. At the end of the article, OpenVPN is compared to IPsec, the quasi-standard in VPN technology. This article will cover the following:
- Networking with OpenVPN
- OpenVPN and firewalls
- Configuring OpenVPN
- OpenVPN versus IpSec
- Source for documentation
In the mid 1990s, the rise of the Internet and the increase in speed of cheap Internet connections paved the way for new technologies. This lead to the idea of providing secure connections between enterprise branches through low-cost lines using the Internet. This is a very basic description of what VPNs are all about.
In this article by Markus Feilner, we will discuss the features and advantages of OpenVPN followed by its release history.Read Advantages and History of OpenVPN in full
In the previous article on Creating a Web Application on JBoss AS 5, we saw how to install JSF on JBoss AS and we enhanced the Appstore Enterpirse application by adding a web layer to it.
In this article by Francesco Marchioni, we will cover in detail how to properly configure JBoss Web Server. Apache Tomcat provides the core functionality of JBoss Web Server. Its embedded engine allows seamless integration with JBoss components, by using the underlying Microkernel system.Read Configuring JBoss Application Server 5 in full
This article by Erlend Dalen, explains the different options to use when you need to search and retrieve a set of data from the database. It shows you how to create a query, how to create a view, and how to write different select statements.
In this article, you will learn about the different methods of retrieving data from the database. They are as follows:
- Queries which are reusable and often used in reports and periodic Jobs
- Views that are created in AOT and translated to optimized select statements at runtime
- Select statements to use in X++ to fetch data from the database to the application
Modeling book sales is not a big deal, you just need a sales fact and a book dimension, and other dimensions, such as date dimension. From this model, you can analyze daily book sales.
But, what if a book is written by more than one writer and an individual writer writes more than one book, i.e. relationship of book to writer is many to many? How would you enhance the existing book sales dimensional model, which has book granularity, to also handle sales analysis by individual writer, i.e. analysis at writer granularity?
In this article by Djoni Darmawikarta, we will discuss the two possible dimensional modeling solutions to handle many-to-many relationship.Read Solving Many-to-Many Relationship in Dimensional Modeling in full
In this two-part article by Jacob Gube, we'll be exploring browser events; we'll see how MooTools can help us watch out for events such as mouse clicks, mouse movements, keyboard presses, and all the events that make our web pages more responsive to user actions.
In this article, we shall:
- Define what events are in web development terms
- Learn how to add event listeners to web page elements
- Find out how to create custom events to extend MooTools' Event object
- Learn how to remove, clone, and fire off events
- Investigate MooTools Events methods and properties