Article Network

Searching for Data in Microsoft Dynamics AX 2009: Part 1

by Erlend Dalen | December 2009 | BPEL Microsoft SOA Web Services

This article by Erlend Dalen, explains the different options to use when you need to search and retrieve a set of data from the database. It shows you how to create a query, how to create a view, and how to write different select statements.

In this article, you will learn about the different methods of retrieving data from the database. They are as follows:

  • Queries which are reusable and often used in reports and periodic Jobs
  • Views that are created in AOT and translated to optimized select statements at runtime
  • Select statements to use in X++ to fetch data from the database to the application
Read Searching for Data in Microsoft Dynamics AX 2009: Part 1 in full

Seasonal eBook Offer: Up to 45% off

by | December 2009 |

This holiday season Packt brings to you attractive discounts on its ebooks. Therefore, in keeping with the festive spirit, we are pleased to announce 30% discount off all Packt eBooks. The offer doesn't end there - on purchases of two or more eBooks you will get 45% off on each eBook.The offer ends on 4th January 2010.Grab your copy NOW!

Read Seasonal eBook Offer: Up to 45% off in full

Securely Encrypt Removable Media with Ubuntu

by Christer Edwards | January 2010 | Linux Servers Open Source

In this tutorial by Christer Edwards, we will look at steps toward encrypting removable media such as USB thumb drives for secure management of personal data. This tutorial will walk the reader through seven steps required toward identifying, formatting and encrypting a removable disk for use as a secure partition.

Read Securely Encrypt Removable Media with Ubuntu in full

Securing a BPEL process

by Matjaz B. Juric | October 2010 | Enterprise Articles Web Development

In this article, by Matjaz B. Juric, author of WS-BPEL 2.0 for SOA Composite Applications with IBM WebSphere 7, we will get familiar with basic security concepts of WebSphere Application Server regarding protection of BPEL processes. We will create and protect a web service export of a BPEL process by user authentication, which requires providing a username and password inside the UsernameToken of the WS-Security specification.

Read Securing a BPEL process in full

Securing a Moodle Instance

by Darko Miletić | February 2011 | Moodle Open Source

In the early days of the web, Internet was mostly used for academic purposes. Hence, all communications protocols had very little or no focus on security. The situation started changing as more and more public and commercial services started moving online and common users started actually using Internet in their daily routine. With the increase of user base we see the emerge of the malicious groups of users, the so-called hackers that are focused mostly on information theft and illegal usage. Nowadays it is quite common to be attacked by hacker(s). In fact it is so common and frequent that it is reported that only the USA's cyber attacks generate costs up to 10 billion dollars every year. The purpose of this article is to introduce you to web security while focusing on Moodle.

In this article by Darko Miletić, author of the book Moodle Security, we will cover the following topics:

  • Moodle and security
  • Weak points
  • The secure Moodle installation
  • Quickly securing Moodle
Read Securing a Moodle Instance in full

Securing Data at Rest in Oracle 11g

by Adrian Neagu | October 2012 | Cookbooks Enterprise Articles Oracle

For almost all organizations, data security is a matter of prestige and credibility. The Oracle Database is one of the richest in features and the most used database in a variety of industries, where security is essential. In this article by Adrian Neagu, author of Oracle 11g Anti-hacker's Cookbook we will learn how to secure data at rest and will cover:

  • Using block device encryption
  • Using filesystem encryption with eCryptfs
  • Using DBMS_CRYPTO for column encryption
  • Using Transparent Data Encryption for column encryption
  • Using TDE for tablespace encryption
  • Using encryption with data pump
  • Using encryption with RMAN

(For more resources on Oracle, see here.)

Read Securing Data at Rest in Oracle 11g in full

Securing data at the cell level (Intermediate)

by Satya SK Jayanty | August 2013 | Enterprise Articles Microsoft

In this article by Satya SK Jayanty, author of the book, Instant SQL Server Analysis Services 2012 Cube Security, explains that a bit of background on leaf members and non-leaf members is necessary to know how the data is managed at cell level.

The cell value in a cube can be obtained in multiple ways; it can be directly retrieved from the fact table of the cube. The identification of a cell value and its members is leaf members that have no child members or hierarchy that reference a single record in a dimension table.

Further on this cell can be identified by using non-leaf members, members that have one or more child members. The cell value is derived (typically) from the aggregation of child members.

Read Securing data at the cell level (Intermediate) in full

Securing Dynamics NAV Applications

by Amit Sachdev Sharan Oberoi | October 2010 | Enterprise Articles Microsoft

In this article, by Sharan Oberoi & Amit Sachdev, author of Microsoft Dynamics NAV Administration, we will discuss the NAV Security Architecture including security recommendations and best practices. Securing our applications is of paramount importance these days. Security becomes even more critical when it is our organization's financial data that needs to be protected.

Essentially, there are a few components of securing the Dynamics NAV application. They are as follows:

  • Network security
  • Hardware security
  • SQL database and Classic database security
  • Dynamics NAV access—roles, users, logins, and permissions
Read Securing Dynamics NAV Applications in full

Securing Moodle Data

by Darko Miletić | March 2011 | Moodle Open Source

Celebrate Moodle March with Packt and get exciting discounts and offers on all Moodle books through out this month. For more information click here.

Moodle is an open source CMS (Course Management System) /LMS (Learning Management System) /VLE (Virtual Learning Environment). Its primary purpose is to enable educational institutions and individuals to create and publish learning content in a coherent and pedagogically valuable manner, so that it can be used for successful knowledge transfer towards students.

When we talk about Moodle data we are referring to both the user and the course information and binary files that are within the platform. In this article by Darko Miletic, author of Moodle Security, we will focus our attention to the protection and separation of internal Moodle data between valid platform users. The topics we will cover include:

  • User information protection
  • Course information protection
Read Securing Moodle Data in full

Securing Network Services with FreeBSD Jails

by Christer Edwards | June 2009 | Open Source

In this article by Christer Edwards, we will explore FreeBSD Jails. FreeBSD Jails are a kernel-level security mechanism which allows you to safely segregate processes within a sandbox environment. Jails are commonly used to secure production network services like DNS or Email by restricting what a process can access. In the case of a malicious attack on one service, all other Jailed processes would remain secure. FreeBSD Jails securely limits, in an administratively simple way, the amount of damage an attacker can do to a server.

Read Securing Network Services with FreeBSD Jails in full

Securing our Applications using OpenSSO in GlassFish Security

by Masoud Kalali | May 2010 | Open Source

OpenSSO is the answer to many complexities that have emerged during recent years because of the complexity and dynamicity of the security functionality required for software systems. The complexity in software security increases as a result of the increase in complexity of security requirements of the target business that the software should drive and diversity in the integration between different partner's software systems that collaborate to complete a client request.

In this article by Masoud Kalali, author of GlassFish Security, we will discuss how to go about securing our application using OpenSSO.

Read Securing our Applications using OpenSSO in GlassFish Security in full

Securing Portal Contents

by Ken Finnigan Luca Stancapiano Piergiorgio Lucidi | January 2013 | JBoss Open Source

In this article by Ken Finnigan, Luca Stancapiano and Piergiorgio Lucidi , authors of GateIn Cookbook, we will cover

  • Securing portals

  • Securing with JBoss AS

  • Securing with Tomcat

  • Choosing the JAAS modules

  • Creating a login page

  • Synchronizing users

  • Securing pages

  • Securing categories

  • Securing applications

  • Securing portlets

Read Securing Portal Contents in full

Securing QlikView Documents

by Stephen Redmond | January 2014 | Enterprise Articles

In this article by Stephen Redmond, author of QlikView Server and Publisher, we will look at different methods of securing QlikView documents.

Read Securing QlikView Documents in full

Securing the Hadoop Ecosystem

by Sudheesh Narayanan | November 2013 | Open Source

In this article by Sudheesh Narayanan, the author of the book Securing Hadoop, we look at the Hadoop ecosystem which consists of various components such as Hive, Oozie, and HBase. We need to secure all the other Hadoop ecosystem components.

In this article, we will look at the each of the ecosystem components and the various security challenges for each of these components, and how to set up secured authentication and user authorization for each of them.

Read Securing the Hadoop Ecosystem in full

Securing the Small Business Server 2008

by David Overton | April 2009 | .NET Microsoft

This article by David Overton covers the process of finishing the network protection and routing setup and configuring the protection of the data on the server. We will cover:

  • Configuring the firewall ports
  • Configuring and testing backups
  • Configuring anti-malware
Read Securing the Small Business Server 2008 in full

Securing vCloud Using the vCloud Networking and Security App Firewall

by Prasenjit Sarkar | November 2013 | Enterprise Articles

In this article by Prasenjit Sarkar, author of the book VMware vCloud Security, we will focus on creating access control policies based on logical constructs such as VMware vCenter Server containers and VMware vCloud Networking and Security Security Groups, but not just physical constructs such as IP addresses.

Read Securing vCloud Using the vCloud Networking and Security App Firewall in full

Securing XML Documents

by Frank Jennings Poornachandra Sarang Ramesh Loganathan | December 2007 | BPEL SOA Web Services

The web services model brings into the system unique security challenges because the business data in the form of XML documents may be required to travel across untrusted networks and has the chance of being manipulated by external systems.

Throughout the entire business transaction, different classes of users and systems need access to the entire business transaction. If any part of this chain is compromised, the whole business application deployed as a service will fail. Web services are inherently about how to share the process of computing across a distributed network of systems. Web services' communication channel being XML, messages are text-based, readable, and self describing.

In this article, authors Poornachandra Sarang, Frank Jennings, Matjaz Juric, and Ramesh Loganathan explain the XML security threats and the guidelines for securing your XML Documents.

Read Securing XML Documents in full

Securing your JIRA 4

by Patrick Li | June 2011 | Enterprise Articles Java

As an information system, JIRA is all about data. It should come as no surprise to you that security plays a big role in JIRA not only to ensure that only the right people get access to the data, but also to maintain data integrity by preventing accidental changes.

By the end of the article by Patrick Li, author of JIRA 4 Essentials, you will have learned:

  • How to utilize user management features in JIRA
  • About JIRA's permission hierarchy
  • About general access control in JIRA
  • How to manage fine-grained permission settings
Read Securing your JIRA 4 in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software