Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 >  |  Displaying page 12 of 12, items 441 to 444 of 444.
Thinking about Security
Does Windows Vista change something fundamental about information security? This book has 14 chapters covering all things new in Windows Vista. It discusses all the things that make propeller hats spin. Yet these are just new features. Fundamentally, Windows Vista has not changed the information security landscape.
The Three-Step Approach to Security
As we discussed earlier, security is too often treated as black or white. It is considered to be either on or off. The security group, if asked at all, all too often defaults to say no to just about everything the business tries to do. Consequently, the security group has become irrelevant.
Building the WinPE Image
You will need to download either the 64-bit or 32-bit version of the WAIK, depending on which version of Windows you are running it on. You also need the file, which contains the WinPE bits. Put it in the same directory as the WAIK installer.
Securing Your Silverlight Application

In my role as a consultant with Microsoft Services, I have regular discussions with customers and partners about application security. In this article, I'll explore some of the themes that arise in those discussions. In particular, I'll focus on the new challenges programmers face when trying to secure Silverlight applications, and I'll consider where development teams should focus their resources.

Top 10
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
- win 2008 FSMO role placement
- Xpath query with namespace(s)
- ASP Button With QueryString
- mac: cycle through browser tabs using keyboard
- function not opening
- Outlook 2007 not loading
- How to detect in VBA is a table is linked
- make Excel not convert certain character strings to non-ASCII
- SSMS 2008 intellisense doesn't show renamed table names
programming4us programming4us