Skip to content
Latest:
  • Oracle Database Security Overview – Part 2 -> Security Enhancements
  • Oracle Database Security Overview – Part 1 – Virtual Private Database
  • IndicThreads Pune 2016 To Equip Developers For A New Age Of Software Development
  • Java Garbage Collectors – Moving to Garbage First (G1) Collector
  • Using Lambdas and Streams in Java 8
IndicThreads

IndicThreads

Software Developer Station

  • News
  • Articles
  • Interviews
  • Contact
  • About

security

Articles 

Oracle Database Security Overview – Part 2 -> Security Enhancements

June 23, 2016 Saurabh Gupta 37332 Views 0 Comments Database, Database Security, oracle, oracle database, Oracle Database 12c, security

In part two of this two part series on Oracle Database Security, Saurabh Gupta covers Oracle Database Security enhancements as well

Read more
Articles 

Oracle Database Security Overview – Part 1 – Virtual Private Database

June 23, 2016June 23, 2016 Saurabh Gupta 33206 Views 0 Comments Database, Database Security, oracle, oracle database, Oracle Database 12c, security

In this two part series, Saurabh Gupta covers the fundamentals of database security solutions from Oracle. Virtual Private Database enforces

Read more
Articles 

Cloud Security: The Cloud is as Secure as you want it to be!

August 3, 2011 Content Team 3189 Views 0 Comments cloud, cloud computing, Cloud Computing Conference, cloudcomputing, home, security, video

This session provides a technical overview of how cloud computing can be made secure across various networks architectures and deployments.

Read more
News 

Web Security Dojo Releases Version v1.0 – Available For Free

February 26, 2010February 26, 2010 Content Team 3974 Views 0 Comments dojo, home, security, testing

Web Security Dojo is a web application security lab with tools, targets, and training materials built into a Virtual Machine(VM).

Read more
Articles 

Ajax Security & Best Practices

May 17, 2009February 5, 2010 Content Team 5670 Views 0 Comments ajax, Articles, atul kahate, conference-videos-08, home, indicthreads conference, Java, Java Articles, ria, Rich Internet application, security

Ajax is perhaps the best known RIA technology today. While several implementations of Ajax have arrived, and many software projects

Read more
News 

1 in 3 Flash Web Applications Violates Security Best Practices

March 24, 2009February 5, 2010 Content Team 32340 Views 0 Comments adobe flash, best practices, home, Java News, News, Python, Python News, Quality News, security, security vulnerabilities, software quality, web applications

HP analyzed almost 4,000 web applications developed with Flash software and found that 35 percent violate Adobe security best practices.

Read more
News 

BSIMM Defines Best Practices For Software Security

March 19, 2009July 6, 2012 Content Team 4218 Views 0 Comments home, Java News, News, Python, Python News, Quality News, security, software quality, software security

A new security model Building Security In Maturity Model (BSIMM) has been released that describes the activities practiced by nine of

Read more
Articles 

Testers Meet To Formalize Anti-Malware Testing Standards

February 8, 2008February 4, 2010 Content Team 3197 Views 0 Comments Articles, Quality, Quality Articles, security, software quality, testing

More than 40 security software technologists and anti-malware testers from around the world recently met in Bilbao, Spain to formalize

Read more
Articles 

Security and Threat Models – Secure Electronic Transaction (SET) Protocol

February 3, 2008February 5, 2010 Atul Kahate 6921 Views 3 Comments atul kahate, Java Articles, protocols, security, ssl, standardization

The subject of threat models is quite interesting in the information security space. It talks about how we model the

Read more

Featured

Oracle Database Security Overview – Part 2  -> Security Enhancements
Articles 

Oracle Database Security Overview – Part 2 -> Security Enhancements

June 23, 2016 Saurabh Gupta 0
Oracle Database Security Overview – Part 1 – Virtual Private Database
Articles 

Oracle Database Security Overview – Part 1 – Virtual Private Database

June 23, 2016June 23, 2016 Saurabh Gupta 0
IndicThreads Pune 2016 To Equip Developers For A New Age Of Software Development
News 

IndicThreads Pune 2016 To Equip Developers For A New Age Of Software Development

May 27, 2016June 1, 2016 Content Team 0
Java Garbage Collectors – Moving to Garbage First (G1) Collector
Articles 

Java Garbage Collectors – Moving to Garbage First (G1) Collector

May 25, 2016May 25, 2016 Content Team 0

Random

Pro Java Programming: 7I Book Review

July 29, 2005February 5, 2010 Content Team 0

Technology Learning and Innovation critical for continued success of Indian software companies

October 5, 2007February 5, 2010 Content Team 0

Use the existing C and C++ libraries using SIP.

August 31, 2005February 5, 2010 Content Team 0

Java’s failure at shared hosting will contribute to its downfall

April 4, 2006July 19, 2010 Harshad Oak 47

Recent Posts

  • Oracle Database Security Overview – Part 2 -> Security Enhancements
  • Oracle Database Security Overview – Part 1 – Virtual Private Database
  • IndicThreads Pune 2016 To Equip Developers For A New Age Of Software Development
  • Java Garbage Collectors – Moving to Garbage First (G1) Collector
  • Using Lambdas and Streams in Java 8

Recent Posts

  • Oracle Database Security Overview – Part 2 -> Security Enhancements
  • Oracle Database Security Overview – Part 1 – Virtual Private Database
  • IndicThreads Pune 2016 To Equip Developers For A New Age Of Software Development
  • Java Garbage Collectors – Moving to Garbage First (G1) Collector
  • Using Lambdas and Streams in Java 8
  • News
  • Articles
  • Interviews
  • Contact
  • About
Copyright © 2025 IndicThreads. All rights reserved.
 

Loading Comments...
 

You must be logged in to post a comment.