In this article by Ian Hlavats, we will look at an example of how to use Seam conversations effectively with Ajax.
We will discuss about:
- Temporary conversations
- Starting a long-running conversation
- Concurrent conversations
Seam can act as JSF backing beans and as the glue between our server-tier Session Beans and our web-tier JSF pages. Unfortunately, though, users could easily break our sample application by entering invalid data (for example, entering blank values or non-numeric values into the edit boxes). Seam provides validation tools to help us to make our application more robust and provide feedback to our users. In this article by David Salter, let's look at these tools.Read Seam Data Validation in full
Search-engine optimization, or SEO, refers to the process of preparing your website to be spidered, indexed, and ranked by the major search engines so that when Internet users search for your keywords, your website will appear on their results page. Proper search engine optimization is a crucial step to ensure success and should be undertaken with care and diligence.
This article by Brandon Dawson and Tom Canavan, takes a look at Search Engine Optimization and how it can be used in Joomla! to build a successful website.Read Search Engine Optimization in Joomla! in full
In this two-part article series by Paul Thewlis, you will learn some of the most important Search Engine Optimization strategies and how to apply them, as well as how to submit your blog to the search engines. In the first part of the article series, we will cover the principles of SEO, how search engines find stuff, how to choose your keywords, figuring out the procedure to install Dean's Permalink migration plugin, and sitemaps.Read Search Engine Optimization in WordPress-part1 in full
In this two-part article series by Paul Thewlis, you will learn some of the most important Search Engine Optimization strategies and how to apply them, as well as how to submit your blog to the search engines. In the article Search Engine Optimization in WordPress-part1, we covered principles of SEO, how search engines find stuff, how to choose your keywords, figuring out the procedure to install Dean's Permalink migration plugin, and sitemaps. In this article, we will look into sitemaps in a little more detailed manner, also figure out search engine submissions, and learn about SEO software and tools.Read Search Engine Optimization in WordPress-part2 in full
In this article by Ben Finklea, we will discuss Sitemaps in detail, right from the origin of sitemaps to how they are used to make sure our entire site is crawled by the search engines. We will cover:
- What sitemaps are and why you should use them
- How to install sitemaps on your Drupal site
- How to submit the XML sitemaps to Google
Knowing where something isn't can be almost as valuable as knowing where something is. If it isn't there, then the time and resources aren't wasted looking in the wrong place. We need to make sure that we have a broad base of methods to manage our future search capabilities. In this article by John Farrar, we will be discussing about the built-in search engine and the custom search engines (Google) in ColdFusion.Read Search Engines in ColdFusion in full
In this article by Vineeth G. Nair, the author of the book Getting Started with Beautiful Soup, we will learn the different searching methods provided by Beautiful Soup to search based on tag name, attribute values of tag, text within the document, regular expression, and so on. At the end, we will make use of these searching methods to scrape data from an online web page.Read Search Using Beautiful Soup in full
In this article by Marc Delisle, we present mechanisms that can be used to find the data we are looking for instead of just browsing tables page-by-page and sorting them. This article covers single-table and whole database searches.Read Searching Data using phpMyAdmin and MySQL in full
This article by Erlend Dalen, explains the different options to use when you need to search and retrieve a set of data from the database. It shows you how to create a query, how to create a view, and how to write different select statements.
In this article, you will learn about the different methods of retrieving data from the database. They are as follows:
- Queries which are reusable and often used in reports and periodic Jobs
- Views that are created in AOT and translated to optimized select statements at runtime
- Select statements to use in X++ to fetch data from the database to the application
This holiday season Packt brings to you attractive discounts on its ebooks. Therefore, in keeping with the festive spirit, we are pleased to announce 30% discount off all Packt eBooks. The offer doesn't end there - on purchases of two or more eBooks you will get 45% off on each eBook.The offer ends on 4th January 2010.Grab your copy NOW!Read Seasonal eBook Offer: Up to 45% off in full
In this tutorial by Christer Edwards, we will look at steps toward encrypting removable media such as USB thumb drives for secure management of personal data. This tutorial will walk the reader through seven steps required toward identifying, formatting and encrypting a removable disk for use as a secure partition.Read Securely Encrypt Removable Media with Ubuntu in full
In this article, by Matjaz B. Juric, author of WS-BPEL 2.0 for SOA Composite Applications with IBM WebSphere 7, we will get familiar with basic security concepts of WebSphere Application Server regarding protection of BPEL processes. We will create and protect a web service export of a BPEL process by user authentication, which requires providing a username and password inside the UsernameToken of the WS-Security specification.Read Securing a BPEL process in full
In the early days of the web, Internet was mostly used for academic purposes. Hence, all communications protocols had very little or no focus on security. The situation started changing as more and more public and commercial services started moving online and common users started actually using Internet in their daily routine. With the increase of user base we see the emerge of the malicious groups of users, the so-called hackers that are focused mostly on information theft and illegal usage. Nowadays it is quite common to be attacked by hacker(s). In fact it is so common and frequent that it is reported that only the USA's cyber attacks generate costs up to 10 billion dollars every year. The purpose of this article is to introduce you to web security while focusing on Moodle.
In this article by Darko Miletić, author of the book Moodle Security, we will cover the following topics:
- Moodle and security
- Weak points
- The secure Moodle installation
- Quickly securing Moodle
For almost all organizations, data security is a matter of prestige and credibility. The Oracle Database is one of the richest in features and the most used database in a variety of industries, where security is essential. In this article by Adrian Neagu, author of Oracle 11g Anti-hacker's Cookbook we will learn how to secure data at rest and will cover:
- Using block device encryption
- Using filesystem encryption with eCryptfs
- Using DBMS_CRYPTO for column encryption
- Using Transparent Data Encryption for column encryption
- Using TDE for tablespace encryption
- Using encryption with data pump
- Using encryption with RMAN
(For more resources on Oracle, see here.)Read Securing Data at Rest in Oracle 11g in full
In this article by Satya SK Jayanty, author of the book, Instant SQL Server Analysis Services 2012 Cube Security, explains that a bit of background on leaf members and non-leaf members is necessary to know how the data is managed at cell level.
The cell value in a cube can be obtained in multiple ways; it can be directly retrieved from the fact table of the cube. The identification of a cell value and its members is leaf members that have no child members or hierarchy that reference a single record in a dimension table.
Further on this cell can be identified by using non-leaf members, members that have one or more child members. The cell value is derived (typically) from the aggregation of child members.Read Securing data at the cell level (Intermediate) in full
In this article, by Sharan Oberoi & Amit Sachdev, author of Microsoft Dynamics NAV Administration, we will discuss the NAV Security Architecture including security recommendations and best practices. Securing our applications is of paramount importance these days. Security becomes even more critical when it is our organization's financial data that needs to be protected.
Essentially, there are a few components of securing the Dynamics NAV application. They are as follows:
- Network security
- Hardware security
- SQL database and Classic database security
- Dynamics NAV access—roles, users, logins, and permissions