
|
| |
Windows IT |
| |
 Beyond the Firewall With the proliferation of malicious attacks aimed at applications, network protection at the physical layer may no longer be enough. [Read More]
|
 Secure Your Intranet Lock down the sites, subsites, content, and Web parts that make your intranet such a powerful tool, without destroying its usefulness. [Read More]
|
|
|
 |
 |
 |
|
| |
Video Connection |
| |

 Watch the Video BEA's Paul Patrick explores the growing use of service-oriented security infrastructures to leverage existing investments and support dynamic changes in enterprise environments. |
|
|
| |
Java |
| |
 Mapping Security to SOA What security hurdles can you overcome when using XML to develop against a services layer? See a whiteboard diagram of security requirements mappings in an SOA. [Read More]
|
 All That JAAS Pluggable authentication and authorization services provide many key security benefits for Java applications. [Read More]
|
|
|
 |
 |
 |
|
|
|
| |
.NET Development |
| |

The LaunchInSandBox utility lets you run an executable in a sandboxed, partially trusted environment with a limited set of CAS permissions.
|
|
|
 |
 |
 |

|
|