InfoQ Homepage Security Content on InfoQ
-
Failure: An Illustrated Guide
Avi Bryant explains the iterative process that led to the concept, implementation, and UI of Trendly (http://trendly.com/ ), using Smalltalk, Javascript, Ruby and Java in the process.
-
When it Just HAS to Work
This talk gives practical tips for adopting an agile approach to planning, team interactions and risk management. When the culture shifts, teams achieve goals sooner and safety is greatly enhanced.
-
Securing A Cloud Infrastructure
George Reese discusses the number one challenge faced by cloud computing - security. He discusses transparency, credential management, and identity management among other topics.
-
GluCon: Post-it Notes (mini-Keynotes)
This presentation is a collection of four fifteen-minute mini-keynotes presented at the Glue conference in Denver, 2009. All presentations focused on aspects of "gluing together" web applications.
-
Building Context Aware Services using Identity as Foundation
This presentation explores the issue of context automation, the forces driving it (e.g. clouds and extensible browsers) before focusing on the role of identity services as a key factor.
-
Realistic about Risk: Software development with Real Options
This session introduces Real Options and shows how it can help in running your project. Real Options is a decision-making process that can be used to manage risk.
-
Financial Transaction Exchange at BetFair.com
This presentation covers Betfair's efforts, e.g. Flywheel, that enables serving 50,000 low cost transactions per second. This technology has become the basis for the Tradefair financial exchange.
-
Stopping Attacks in a Web 2.0 World
Jeff Williams explains two major security holes threatening the world of Web 2.0 applications: Cross Site Request Forgery (CSRF) and Advanced Cross Site Scripting ((XSS).
-
Establishing Your Organization's Enterprise Security API
In this talk, Jeff discuss the process of establishing a security API for your enterprise, focusing on the most critical methods needed by web application and web service developers.
-
Advanced Threat Modeling
John Steven talks about modeling security threats as a way to secure a system while designing its architecture. John focuses on authentication, authorization and session management.
-
Secure Programming with Static Analysis
Creating secure code requires more than just good intentions. Static source code analysis can be used to uncover the kinds of errors that lead directly to vulnerabilities. Brian Chess shows you how.
-
Operational Scalability in the Next Generation Web World
Wayne Fenton, Director of Architecture at eBay Inc., talks about the ways in which software architects can design systems for much-improved efficiency and reliability from an operational perspective.