In this article series by Masoud Kalali, author of GlassFish Security, we are going to develop a secure Java EE application with all standard modules including Web, EJB, and application client modules.Read Developing Secure Java EE Applications in GlassFish in full
In this article series by Masoud Kalali, author of GlassFish Security, we are going to develop a secure Java EE application with all standard modules including Web, EJB, and application client modules.Read Designing Secure Java EE Applications in GlassFish in full
As you may have seen last month, Packt is continuing to dedicate a great deal of time to SOA. We are now happy to offer you an early bird discount on this October’s third International SOA Symposium, and the co-located second International Cloud Symposium in Berlin.Read 3rd International SOA Symposium in full
In a university, large class sizes limit class discussions and individual attention, while travel budgets limit the number of professional conferences where faculty can present. In this article by Erik Rose, author of the book Plone 3 for Education, we will set up blogs and forums to counter both problems—giving students more class interaction and helping faculty build professional prominence. We'll find the best Plone blog products and explore practical suggestions of how to use blogs in the classroom. We'll also take the undisputedly top forum product for a spin and see how to use it to let students support each other, saving office hours and after-school help for those who need them most.Read Blogs and Forums using Plone 3 in full
This article by Paul Taylor, author of the book Moodle 1.9 for Design and Technology, will deal with a system that will allow students to reflect on their own work through the setting of targets by staff and themselves. As with all things in Moodle, there are a number of ways to achieve this, but perhaps the most accessible is the third party module called the Individual Learning Plan (ILP) activity module, developed and maintained by ULCC and available at http://moodle.org/mod/data/view.php?d=13&rid=1025&filter=1.Read Individual Learning Plan (ILP) with Moodle 1.9 in full
With Amazon SimpleDB you can scale your application's database on the cloud. In this article by Prabhakar Chaganti and Rich Helms, authors of Amazon SimpleDB Developer Guide, we going to sign up for an AWS account, download and install the necessary libraries, and create little code snippets for exploring SimpleDB. We will introduce the libraries as well as the SimpleDB Firefox plugin for manipulating SimpleDB. We will also examine the two methods for accessing SimpleDB: SOAP and ReST. For PHP users we will introduce the PHP sample library. You can install the samples on your PHP5 server so that you can try the samples as you read about them.
In this article we will:
- Set up an AWS account
- Enable SimpleDB service for the account
- Install and set up libraries for Java, PHP, and Python
- Illustrate several SimpleDB operations using these libraries
OpenID is a very popular form of trusted identity management that allows users to manage their identity through a single trusted provider. This convenient feature provides users with the security of storing their password and personal information with the trusted OpenID provider, optionally disclosing this personal information upon request. Additionally, the OpenID-enabled website can have confidence that the users providing OpenID credentials is who they say they are.
In this article by Peter Mularien, author of the book Spring Security 3, we will:
- Learn to set up our own OpenID in less than five minutes
- Configure the JBCP Pets website with a very rapid implementation of OpenID
- Learn the conceptual architecture of OpenID and how it provides your site with trustworthy user access
- Implement OpenID-based user registration
- Experiment with OpenID attribute exchange for user profile functionality
This article by Timi Ogunjobi, author of Joomla! 1.5 Site Blueprints, covers basic details about installing and configuring Joomla! for use on both local and remote servers. This article also contains information about where to obtain essential resources for learning, using, and optimizing Joomla!Read Installing and Configuring Joomla! on Local and Remote Servers in full
There are a number of electronic portfolios (e-portfolios) available to work with Moodle and they range in complexity and functionality. As they are a very personal thing, this article will try to give an overview of the most popular portfolios and a review of their main features in terms of supplementing Design Technology courses, as well as some examples of how they might be used to best effect.
In this article by Paul Taylor, author of the book Moodle 1.9 for Design and Technology, we will look at three popular portfolio applications:
Themes are among the most powerful features that can be used to customize a web site, especially in Plone. Using custom themes can help you brand your site for a particular corporate image; it ensures standards compliance and creates easily navigable layouts. But most Plone users still continue to use default themes as developing and deploying themes that are flexible and easily maintainable is not always straightforward.
In the article by Veda Williams, author of Plone 3 Theming, we will learn :
- About the theme
- Creating a theme product
- Altering the theme product's structure
- Installing the theme product
- Adjusting web site content to support the design
This article by Erik Rose, author of the book Plone 3 for Education, is a crash course in Plone 3 theme creation. After untangling Plone's confusing theming situation, we walk you through the development of a skeletal theme.Read Plone 3 Themes in full
Bad news is always good news for the press. This is why Vaughan Pyre has decided to take advantage of this fact and creates a website that will aggregate bad news and weird happenings from all over the world. In this article by Timi Ogunjobi, author of Joomla! 1.5 Site Blueprints, the content of the site will be entirely derived from Really Simple Syndication (RSS) feeds from several sources (each feed being automatically fetched and its items displayed on the website).
Weird Hap'nins requirements will be the need to:
- Get external feed sources and allocate them to menu links on the website
- Create the means to automatically fetch and display article items located in the feeds
- Display the latest content from all feed sources on the front page
Cognos Report Studio is widely used for creating and managing business reports in medium to large companies. It is simple enough for any business analyst, power user, or developer to pick up and start developing basic reports. However, when it comes to developing more sophisticated, fully functional business reports for wider audiences, report authors will need guidance.
In this article, by Abhishek Sanghani, author of IBM Cognos 8 Report Studio Cookbook, we will show you that even though macros are often considered a Framework Modeler's tool, they can be used within Report Studio as well. These recipes will show you some very useful macros around security, string manipulation, and prompting.Read Use of macros in IBM Cognos 8 Report Studio in full
Spring Python takes the concepts of the Spring Framework and Spring Security, and brings them to the world of Python. It isn't a simple line-by-line port of the code. Instead, it takes some powerful ideas that were discovered in the realm of Java, and pragmatically applies them in the world of Python.
Spring (Java) provides many simple, easy-to-use functional parts to assemble applications instead of a monolithic framework to extend. Spring Python uses this same approach. This means we can use as little or as much Spring Python as we need to get the job done for each Python application.
In this article by Greg Lee Turnquist, Author of Spring Python 1.1, we will show you how to rapidly write pure SQL queries without dealing with mind-numbing boilerplate code. It also shows how Spring Python works nicely with ORM-based persistence.Read Easily Writing SQL Queries with Spring Python in full
This article by Peter Mularien is an excerpt from the book Spring Security 3.
In this article, we will:
- Examine different methods of configuring password encoding
- Understand the password salting technique of providing additional security to stored passwords