Xebia
Digital Transformation
Agile Transformation
Cloud
Data and AI
DevOps and SRE
Digital Strategy
Intelligent Automation
Microsoft Services
Software Technology
Industries
Banking and Financial Services
Business and IT
Healthcare
Insurance
Non-Profit
Private Equity
Public and Utilities
Retail and Consumer Goods
Technology, Telecom and Media
Transport, Trade and Logistics
Travel and Hospitality
Solutions
Training
Customer Stories
Insights
News
Blog
Articles
Podcasts
Events
Books
Careers
About us
About us
Team
Partners
ESG
Diversity & Inclusion
Empowered Series
Contact and Locations
Global
Global
Switzerland
Digital Transformation
Agile Transformation
Cloud
Data and AI
DevOps and SRE
Digital Strategy
Intelligent Automation
Microsoft Services
Software Technology
Industries
Banking and Financial Services
Business and IT
Healthcare
Insurance
Non-Profit
Private Equity
Public and Utilities
Retail and Consumer Goods
Technology, Telecom and Media
Transport, Trade and Logistics
Travel and Hospitality
Solutions
Training
Customer Stories
Insights
News
Blog
Articles
Podcasts
Events
Books
Careers
About us
About us
Team
Partners
ESG
Diversity & Inclusion
Empowered Series
Contact and Locations
Globe
Global
Global
Switzerland
Sharing Knowledge
Security
Cloud
(493)
Technology
(403)
Agile Transformation
(374)
Software Development
(337)
Data
(282)
Java
(264)
AWS
(250)
Domains
(198)
Agile Architecture
(138)
Google Cloud Platform
(122)
Data Science and AI
(112)
Security
(111)
Software Technology
(103)
Testing
(96)
Topics
(94)
Continuous Delivery
(92)
UK
(91)
Microsoft Services
(89)
DevOps
(85)
Azure
(71)
Leadership and Culture
(69)
Software Quality
(67)
Software Development
(67)
Product Development
(67)
Agile and Scrum
(63)
Python
(62)
Security
Wicket, JBoss, JAAS, LDAP
Serge Beaumont
08 May, 2008
Security
Security Protocols and common attacks.
Sunil Prakash Inteti
11 Dec, 2007
Security
Playing Another User Role Using ACEGI
Vikas Hazrati
16 Jul, 2007
Page 8 of 8
«
1
2
…
6
7
8