Article Network

Scripty2 in Action

by Jose Argudo Blanco | April 2010 | Open Source

In this article by Jose Argudo, we will explore scripty2 library. We will discuss the core aspects of scripty2 right from how to get started to Scripty2 UI and Scripty2 FX. We will learn about some of the interesting UI controls like accordion, tabs and autocompleter. We will also cover various effects like the fading effect, appear effect, morphing effect and finally complex morphing from Scripty2 FX.

Read Scripty2 in Action in full

Seam and AJAX

by David Salter | April 2009 | Open Source

With the advent of Web 2.0 technologies, users have demanded more interactive web applications. Typically, AJAX technologies are used to provide a high level of interactivity within web applications. In this article by David Salter, we will discuss how AJAX can be used with Seam applications using both Seam Remoting and AJAX4JSF. In particular, we'll pay attention to:

  • Seam Remoting
  • Configuring applications to use Seam Remoting
  • Developing Seam Remoting clients and servers
  • Debugging Seam Remoting applications
  • AJAX4JSF
Read Seam and AJAX in full

Seam Conversation Management using JBoss Seam Components: Part 1

by Ian Hlavats | December 2009 | JBoss

In this article by Ian Hlavats, we will look at an example of how to use Seam conversations effectively with Ajax.

We will discuss about:

  • Temporary conversations
  • Starting a long-running conversation
  • Concurrent conversations
Read Seam Conversation Management using JBoss Seam Components: Part 1 in full

Seam Data Validation

by David Salter | May 2009 | Java Open Source Web Development

Seam can act as JSF backing beans and as the glue between our server-tier Session Beans and our web-tier JSF pages. Unfortunately, though, users could easily break our sample application by entering invalid data (for example, entering blank values or non-numeric values into the edit boxes). Seam provides validation tools to help us to make our application more robust and provide feedback to our users. In this article by David Salter, let's look at these tools.

Read Seam Data Validation in full

Search Engine Optimization in Joomla!

by Brandon Dawson Tom Canavan | November 2007 | Joomla! Content Management Open Source

Search-engine optimization, or SEO, refers to the process of preparing your website to be spidered, indexed, and ranked by the major search engines so that when Internet users search for your keywords, your website will appear on their results page. Proper search engine optimization is a crucial step to ensure success and should be undertaken with care and diligence.

This article by Brandon Dawson and Tom Canavan, takes a look at Search Engine Optimization and how it can be used in Joomla! to build a successful website.

Read Search Engine Optimization in Joomla! in full

Search Engine Optimization in WordPress-part1

by Paul Thewlis | May 2009 | Content Management Open Source PHP WordPress

In this two-part article series by Paul Thewlis, you will learn some of the most important Search Engine Optimization strategies and how to apply them, as well as how to submit your blog to the search engines. In the first part of the article series, we will cover the principles of SEO, how search engines find stuff, how to choose your keywords, figuring out the procedure to install Dean's Permalink migration plugin, and sitemaps.

Read Search Engine Optimization in WordPress-part1 in full

Search Engine Optimization in WordPress-part2

by Paul Thewlis | May 2009 | Content Management Open Source PHP WordPress

In this two-part article series by Paul Thewlis, you will learn some of the most important Search Engine Optimization strategies and how to apply them, as well as how to submit your blog to the search engines. In the article Search Engine Optimization in WordPress-part1, we covered principles of SEO, how search engines find stuff, how to choose your keywords, figuring out the procedure to install Dean's Permalink migration plugin, and sitemaps. In this article, we will look into sitemaps in a little more detailed manner, also figure out search engine submissions, and learn about SEO software and tools.

Read Search Engine Optimization in WordPress-part2 in full

Search Engine Optimization using Sitemaps in Drupal 6

by Ben Finklea | September 2009 | MySQL Content Management Drupal Open Source PHP

In this article by Ben Finklea, we will discuss Sitemaps in detail, right from the origin of sitemaps to how they are used to make sure our entire site is crawled by the search engines. We will cover:

  • What sitemaps are and why you should use them
  • How to install sitemaps on your Drupal site
  • How to submit the XML sitemaps to Google
Read Search Engine Optimization using Sitemaps in Drupal 6 in full

Search Engines in ColdFusion

by John Farrar | August 2008 | AJAX Web Development

Knowing where something isn't can be almost as valuable as knowing where something is. If it isn't there, then the time and resources aren't wasted looking in the wrong place. We need to make sure that we have a broad base of methods to manage our future search capabilities. In this article by John Farrar, we will be discussing about the built-in search engine and the custom search engines (Google) in ColdFusion.

Read Search Engines in ColdFusion in full

Search Using Beautiful Soup

by Vineeth G. Nair | January 2014 | Open Source Web Development

In this article by Vineeth G. Nair, the author of the book Getting Started with Beautiful Soup, we will learn the different searching methods provided by Beautiful Soup to search based on tag name, attribute values of tag, text within the document, regular expression, and so on. At the end, we will make use of these searching methods to scrape data from an online web page.

Read Search Using Beautiful Soup in full

Searching Data using phpMyAdmin and MySQL

by Marc Delisle | February 2009 | PHP

In this article by Marc Delisle, we present mechanisms that can be used to find the data we are looking for instead of just browsing tables page-by-page and sorting them. This article covers single-table and whole database searches.

Read Searching Data using phpMyAdmin and MySQL in full

Searching for Data in Microsoft Dynamics AX 2009: Part 1

by Erlend Dalen | December 2009 | BPEL Microsoft SOA Web Services

This article by Erlend Dalen, explains the different options to use when you need to search and retrieve a set of data from the database. It shows you how to create a query, how to create a view, and how to write different select statements.

In this article, you will learn about the different methods of retrieving data from the database. They are as follows:

  • Queries which are reusable and often used in reports and periodic Jobs
  • Views that are created in AOT and translated to optimized select statements at runtime
  • Select statements to use in X++ to fetch data from the database to the application
Read Searching for Data in Microsoft Dynamics AX 2009: Part 1 in full

Seasonal eBook Offer: Up to 45% off

by | December 2009 |

This holiday season Packt brings to you attractive discounts on its ebooks. Therefore, in keeping with the festive spirit, we are pleased to announce 30% discount off all Packt eBooks. The offer doesn't end there - on purchases of two or more eBooks you will get 45% off on each eBook.The offer ends on 4th January 2010.Grab your copy NOW!

Read Seasonal eBook Offer: Up to 45% off in full

Securely Encrypt Removable Media with Ubuntu

by Christer Edwards | January 2010 | Linux Servers Open Source

In this tutorial by Christer Edwards, we will look at steps toward encrypting removable media such as USB thumb drives for secure management of personal data. This tutorial will walk the reader through seven steps required toward identifying, formatting and encrypting a removable disk for use as a secure partition.

Read Securely Encrypt Removable Media with Ubuntu in full

Securing a BPEL process

by Matjaz B. Juric | October 2010 | Enterprise Articles Web Development

In this article, by Matjaz B. Juric, author of WS-BPEL 2.0 for SOA Composite Applications with IBM WebSphere 7, we will get familiar with basic security concepts of WebSphere Application Server regarding protection of BPEL processes. We will create and protect a web service export of a BPEL process by user authentication, which requires providing a username and password inside the UsernameToken of the WS-Security specification.

Read Securing a BPEL process in full

Securing a Moodle Instance

by Darko Miletić | February 2011 | Moodle Open Source

In the early days of the web, Internet was mostly used for academic purposes. Hence, all communications protocols had very little or no focus on security. The situation started changing as more and more public and commercial services started moving online and common users started actually using Internet in their daily routine. With the increase of user base we see the emerge of the malicious groups of users, the so-called hackers that are focused mostly on information theft and illegal usage. Nowadays it is quite common to be attacked by hacker(s). In fact it is so common and frequent that it is reported that only the USA's cyber attacks generate costs up to 10 billion dollars every year. The purpose of this article is to introduce you to web security while focusing on Moodle.

In this article by Darko Miletić, author of the book Moodle Security, we will cover the following topics:

  • Moodle and security
  • Weak points
  • The secure Moodle installation
  • Quickly securing Moodle
Read Securing a Moodle Instance in full

Securing Data at Rest in Oracle 11g

by Adrian Neagu | October 2012 | Cookbooks Enterprise Articles Oracle

For almost all organizations, data security is a matter of prestige and credibility. The Oracle Database is one of the richest in features and the most used database in a variety of industries, where security is essential. In this article by Adrian Neagu, author of Oracle 11g Anti-hacker's Cookbook we will learn how to secure data at rest and will cover:

  • Using block device encryption
  • Using filesystem encryption with eCryptfs
  • Using DBMS_CRYPTO for column encryption
  • Using Transparent Data Encryption for column encryption
  • Using TDE for tablespace encryption
  • Using encryption with data pump
  • Using encryption with RMAN

(For more resources on Oracle, see here.)

Read Securing Data at Rest in Oracle 11g in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software