Robert Winch explains how to secure a multi-tenant application with Spring Security and how to enable OAuth 2.
Mark Ryland presents and demoes identity and access management concepts as used in the cloud and EC2 security groups and packet networking inside the Amazon AWS.
Khawaja Shams presents how NASA’s JPL uses cloud computing, and evaluates some of the existing cloud computing myths in the MythBusters style.
Kunal Bhasin discusses in-memory and Big Data computing techniques used for the detection of banking fraud in real time.
Pat Patterson discusses ways of consuming RESTful APIs from Clojure on a securely manner using OAuth 2.0.
Graham Lee discusses designing, building and testing a secure mobile app, detailing several vulnerabilities that can be found in such apps and ways to deal with them.
Ben Stopford, Farzad Pezeshkpour and Mark Atwell discuss: the Manhattan processor – avoiding GC pauses-, beyond messaging with ODC, Risk, data virtualization and collaboration in banking.
Jonathan Shapiro, Dean Tribble, Marc Steigler, David Wagner and Mark S. Miller (moderator) present their view on achieving security while using modularity for building large systems.
Martin Thompson and Michael Barker explain how Intel x86_64 processors and their memory model work along with low-level techniques that help creating lock-free software.
Paul Downey talks on the current status of identity management on the web covering cross-site challenges, REST, HTTPS, Open ID, all in the context of enterprise architecture.
Craig Walls discusses the need for adding social features to applications, how to secure such applications and how Spring Social can help.
Mark S. Miller explains how to create secure mashups with ECMAScript 5, emphasizing the security pitfalls to be avoided and patterns to use in order to stay clear of them.