InfoQ Homepage Security Content on InfoQ
-
Security for the Services World
Chris Riley presents security issues threatening service based systems, examining security threats, presenting measures to reduce the risks, and mentioning available security frameworks.
-
Working With Spring Web Flow
Keith Donald discusses controller modules, Ajax events, partial responses, security, data access, lazy-load exceptions, testing, flow design/implementation best practices, and deploying flows.
-
Overview of the Spring 3.0 Web Stack
Keith Donald discusses the Spring 3.0 web stack, key features, demos of Spring MVC, REST support, automatic data conversion, data binding and validation, and the roadmap for the Spring web stack.
-
Failure: An Illustrated Guide
Avi Bryant explains the iterative process that led to the concept, implementation, and UI of Trendly (http://trendly.com/ ), using Smalltalk, Javascript, Ruby and Java in the process.
-
When it Just HAS to Work
This talk gives practical tips for adopting an agile approach to planning, team interactions and risk management. When the culture shifts, teams achieve goals sooner and safety is greatly enhanced.
-
Securing A Cloud Infrastructure
George Reese discusses the number one challenge faced by cloud computing - security. He discusses transparency, credential management, and identity management among other topics.
-
GluCon: Post-it Notes (mini-Keynotes)
This presentation is a collection of four fifteen-minute mini-keynotes presented at the Glue conference in Denver, 2009. All presentations focused on aspects of "gluing together" web applications.
-
Building Context Aware Services using Identity as Foundation
This presentation explores the issue of context automation, the forces driving it (e.g. clouds and extensible browsers) before focusing on the role of identity services as a key factor.
-
Realistic about Risk: Software development with Real Options
This session introduces Real Options and shows how it can help in running your project. Real Options is a decision-making process that can be used to manage risk.
-
Financial Transaction Exchange at BetFair.com
This presentation covers Betfair's efforts, e.g. Flywheel, that enables serving 50,000 low cost transactions per second. This technology has become the basis for the Tradefair financial exchange.
-
Stopping Attacks in a Web 2.0 World
Jeff Williams explains two major security holes threatening the world of Web 2.0 applications: Cross Site Request Forgery (CSRF) and Advanced Cross Site Scripting ((XSS).
-
Establishing Your Organization's Enterprise Security API
In this talk, Jeff discuss the process of establishing a security API for your enterprise, focusing on the most critical methods needed by web application and web service developers.