In this article by Jose Sandoval, we implement the web service requirements we outlined in the previous article on RESTful Web Services Design, with the RESTEasy framework. RESTEasy is not only a RESTful framework, but is also JBoss's umbrella project that provides other frameworks to build RESTful web services. As part of the REST facilities, RESTEasy fully implements the JAX-RS specification. Subsequently, we only look at how we use RESTEasy to implement RESTful web services. At the time of this writing, the released version is 1.1GA.Read RESTful Web Service Implementation with RESTEasy in full
This article by M.L.Srinivasan, covers concepts related to vulnerability assessment and penetration testing.
In this article, we'll focus on IT vulnerabilities, the impact due to compromise, and the overall cycle of vulnerability and penetration tests. We'll also discuss some of the emerging standards in terms of vulnerability naming systems such as Common Vulnerabilities and Exposures (CVE), which is a dictionary for vulnerability names; and Common Vulnerability Scoring System (CVSS), as defined by the National Institute of Standards and Technology (NIST).Read CISSP: Vulnerability and Penetration Testing for Access Control in full
In this article by Dan Wellman, we will look at the tabs component of jQuery UI; a simple but effective means of presenting structured content in an engaging and interactive widget.
In this article, we will discuss the following topics:
- The default implementation of the widget
- How the CSS framework targets tab widgets
- How to apply custom styles to a set of tabs
- Configuring tabs using their options
- Built-in transition effects for content panel changes
REST (REpresentational State Transfer) is an architecture for distributed hypermedia systems. The World Wide Web is possibly the best known implementation of this architecture style. The term "REST" was coined and described by a dissertation written by Roy Fielding in 2000. This article by Nicholas Floyd covers the architecture which contains four basic constructs that address common concerns such as: scalability, generalized interfaces and resources, and patternized approaches for manipulation of resources.Read Developing a REST based Web Service in full
This article by M.L.Srinivasan, covers concepts related to access control, methodologies and techniques, authentication, and access-related attacks and countermeasures.
Access control, as the name implies, is the domain that deals with controlling access to information and the associated information system assets such as computers, networks, data center, etc. As with the overall objective of information security, access control is to preserve the CIA of information assets by way of administrative, technical (logical), and physical controls.Read CISSP: Security Measures for Access Control in full