Starting in 1996, Alexa Internet has been donating their crawl data to the Internet Archive. Flowing in every day, these data are added to the Wayback Machine after an embargo period.
Starting in 1996, Alexa Internet has been donating their crawl data to the Internet Archive. Flowing in every day, these data are added to the Wayback Machine after an embargo period.
TIMESTAMPS
The Wayback Machine - https://web.archive.org/web/20110323065235/http://www.developer.com:80/security/
The Records Center is an important MOSS (Microsoft Office SharePoint Server) component for companies that need to save critical or legally sensitive information. Discover how to create a Records Center then secure its contents with the MOSS Object Model and one of its default WebServices.
The WebLogic Portal provides a highly flexible and customizable security framework. Knowing your options will help you plan the security implementation that is usable, reliable and maintainable.
Discover the basic principles of Application Security and how it relates to various government and industry regulations and standards. Also, learn about internal and external Information Security threats and how to protect systems and applications better.
People are building desktop applications for the web that are unlike any web-based application anyone has ever seen before. Adobe is leading this movement with a cross-operating system runtime that enables you to create rich applications that can run either online or offline, when appropriate or necessary.
See how a setup project with a custom action lets the user define the connection string using the Data Links dialog and encrypt that connection string using RSA encryption.
Learn about file access control lists and how to use C# to read and modify them to improve the security of your applications and your IT infrastructure.
One of the advantages of using object-oriented languages is that much of the error/exception handling is built directly into the language itself. Thus, many of these issues can be handled during the design of the application—and not when the application crashes in the hands of a user.
Compare the economic and technical differences among voice authenticated applications and those using traditional or other biometric methods of authentication.
For long-term Visual C++ developers, the CryptoAPI will be a familiar part of your programming toolkit. If you're developing Windows Vista applications, though, you should be applying the new Windows Cryptography API: Next Generation.