Enterprise development security
Enterprise development security involves the use of software, hardware, and procedural methods to protect applications from external threats. Enterprise Java security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive enterprise data. Learn design techniques and how to design secure Java applications. Find best practices, examples and strategies for designing security into enterprise Java applications.
News:1 - 3 of 22
Mobile development teams may put corporate data security at risk
14 Dec 2012
News - Mobile app developers might be more responsible for mobile and corporate data security concerns than any other factor, including lost devices.
Designing and Architecting Tasks to Rule 2012
30 Dec 2011
News - The 2011 TSS Java Trends survey seems to indicate that overwhelmingly, designing and architecting tasks will rule with a whopping 70% of respondents indicating so. Coding entirely new apps jumped up to 39% as well. Seems that new apps are the new black...
OCPJP & OCAJP: Java 7 training requirement for the Oracle Certified Professional Programmer dropped
21 Dec 2011
News - In order to obtain the certified architect position from Oracle, attending and passing a training course is now required. But what about the Java Professional and Java Associate designations, OCPJP and OCAJP for Java 7?
Downloads:1 - 1 of 1
8 AngularJS questions with Mark Bates
24 Mar 2014
Podcast - TheServerSide got a chance to chat with Mark Bates, a freelance software developer, about AngularJS.
Reference & Learning:1 - 3 of 21
Allaying the AWS security concerns: How the cloud became more secure than on-premise
19 May 2014
Feature - Many organizations stayed away from the cloud over concerns for security. But in the Internet of things, where everything is connected, organizations are embracing AWS and other clouds, believing them to be more secure than on-premise data centers.
Tactics, tools and teamwork: Effectively managing cloud security
19 May 2014
Feature - Managing security in the cloud is a completely new ball game, from dealing with remote storage, to worrying about who has access to your programs and applications. Here we talk with the experts from TrendMicro about how cloud computing is changing the...
YARN and MapReduce 2.0 elevates big data Hadoop and scheduled processing
03 Jan 2014
Feature - YARN represents the biggest architectural change in Hadoop since it's inception over seven years ago. Now, Hadoop goes beyond MapReduce to provide scheduled processing while simultaneously processing big data.
Expert Technical Advice:1 - 2 of 2
Water-Scrum-fall: It's not an Agile methodology
07 Jun 2012
Video Tip - The bottom line? You're either Agile or you're not, and if you're not, using water-Scrum-fall to squeeze in Agile methodologies may only create problems and resentment.
Private cloud computing models alleviate some cloud security issues
03 May 2012
Tip - Private cloud computing may provide enterprise organizations seeking the performance, scalability and cost efficiencies of a cloud architecture but have serious security concerns.