Skip to content
Latest:
  • Oracle Database Security Overview – Part 2 -> Security Enhancements
  • Oracle Database Security Overview – Part 1 – Virtual Private Database
  • IndicThreads Pune 2016 To Equip Developers For A New Age Of Software Development
  • Java Garbage Collectors – Moving to Garbage First (G1) Collector
  • Using Lambdas and Streams in Java 8
IndicThreads

IndicThreads

Software Developer Station

  • News
  • Articles
  • Interviews
  • Contact
  • About

user authentication

Articles 

Secure Ajax Based User Authentication

October 7, 2008February 5, 2010 Atul Kahate 5936 Views 5 Comments ajax, atul kahate, Java Articles, ssl, user authentication

Ajax allows us to build Web 2.0 applications with ease. However, it also raises a number of questions. One such

Read more
Articles 

Security Assertion Markup Language (SAML)

March 19, 2008February 5, 2010 Atul Kahate 6331 Views 7 Comments atul kahate, Java Articles, user authentication

Identity management is one of the most interesting security problems to solve. How do we establish and then confirm the

Read more
Articles 

Password Based Authentication Using Message Digests

March 10, 2008February 5, 2010 Atul Kahate 4738 Views 2 Comments atul kahate, Java Articles, user authentication

The question of how best to perform user authentication is a puzzle that is quite tough to solve. While newer

Read more

Featured

Oracle Database Security Overview – Part 2  -> Security Enhancements
Articles 

Oracle Database Security Overview – Part 2 -> Security Enhancements

June 23, 2016 Saurabh Gupta 0
Oracle Database Security Overview – Part 1 – Virtual Private Database
Articles 

Oracle Database Security Overview – Part 1 – Virtual Private Database

June 23, 2016June 23, 2016 Saurabh Gupta 0
IndicThreads Pune 2016 To Equip Developers For A New Age Of Software Development
News 

IndicThreads Pune 2016 To Equip Developers For A New Age Of Software Development

May 27, 2016June 1, 2016 Content Team 0
Java Garbage Collectors – Moving to Garbage First (G1) Collector
Articles 

Java Garbage Collectors – Moving to Garbage First (G1) Collector

May 25, 2016May 25, 2016 Content Team 0

Random

Complementing Unit Test with Dependency Injection and Mock Objects

December 5, 2007February 5, 2010 Content Team 0

1 in 3 Flash Web Applications Violates Security Best Practices

March 24, 2009February 5, 2010 Content Team 0

Ajax and Google Web Toolkit (GWT) session at the Pune Meet On Java Technology

July 24, 2006February 5, 2010 Content Team 2

Backbase Enterprise Ajax for Java Introduces Free Community Version

May 20, 2008February 5, 2010 Content Team 0

Recent Posts

  • Oracle Database Security Overview – Part 2 -> Security Enhancements
  • Oracle Database Security Overview – Part 1 – Virtual Private Database
  • IndicThreads Pune 2016 To Equip Developers For A New Age Of Software Development
  • Java Garbage Collectors – Moving to Garbage First (G1) Collector
  • Using Lambdas and Streams in Java 8

Recent Posts

  • Oracle Database Security Overview – Part 2 -> Security Enhancements
  • Oracle Database Security Overview – Part 1 – Virtual Private Database
  • IndicThreads Pune 2016 To Equip Developers For A New Age Of Software Development
  • Java Garbage Collectors – Moving to Garbage First (G1) Collector
  • Using Lambdas and Streams in Java 8
  • News
  • Articles
  • Interviews
  • Contact
  • About
Copyright © 2025 IndicThreads. All rights reserved.