Colin Harrington warns that application security is not a concern that we can ignore. Vulnerabilities come from various angles, but it is important to stay aware so we can recognize and thwart threats
Jeremy Stieglitz discusses best practices for a data-centric security , compliance and data governance approach, with a particular focus on two customer use cases.
Rob Winch shows how to incrementally build security into an application, highlighting the new features in Spring Security 4 along the way.
David Syer explores the new features in Spring OAuth2, providing guidance on what to use and when, and showing how easy they are to enable quickly.
The authors demonstrate the design and use of an environment for quantitative researchers building a market risk simulation first as a basic system and then adding a hypothetical systemic shock.
Sam McAfee focuses on quantitative risk modeling approaches exploring how to bring scientific rigor back into the Lean Startup process with Monte Carlo simulations and Cost of Delay scenarios.
Rupert Scofield explains how to build, motivate, and manage a team that both embraces the mission and delivers financial results, how to mitigate risk, and how to solve interpersonal conflicts.
Scott Smerchek presents the benefits of using a nonprofit web project to learn Rails and what he learned while building LoveKC.org, introducing various Rails topics.
Josh Long introduces some of the latest Spring features supporting HATEOAS-compliant and OAuth-secured REST services, NoSQL and Big Data, Websockets, OAuth, open-web security and mobile.
The authors present design patterns and use cases of capital market firms that are incorporating big data technologies into their credit risk analysis, price discovery or sentiment analysis software.
Paul Fremantle discusses using WSO2 Identity Server for a federated identity for the Internet of Things.