This article by M.L.Srinivasan, covers concepts related to access control, methodologies and techniques, authentication, and access-related attacks and countermeasures.
Access control, as the name implies, is the domain that deals with controlling access to information and the associated information system assets such as computers, networks, data center, etc. As with the overall objective of information security, access control is to preserve the CIA of information assets by way of administrative, technical (logical), and physical controls.Read CISSP: Security Measures for Access Control in full
In this article by Dan Wellman, we will look at the tabs component of jQuery UI; a simple but effective means of presenting structured content in an engaging and interactive widget.
In this article, we will discuss the following topics:
- Controlling tabs using their methods
- Custom events defined by tabs
- AJAX tabs
This article by David Thomas discusses the Trinidad tags and their attributes in a structured manner. The reader will gain an insight into the design of Trinidad allowing them to draw an efficient mental map of the library and an effective selection and application of tags. More concretely, the following topics are covered:
- An overview of the XHTML-focused Trinidad namespace trh
- An overview of the central Trinidad namespace tr
- An orientation and classification on the attributes supported by Trinidad