Another method or implementation of cryptography is the Identity based which derives from the public-key cryptography. Initially developed by Shamir...
Security can be considered at different levels, we can think about how can we make our connexions secure and avoid...
Trying to build an efficient and secure system is a hard task and no exact method or technique has been...
The proliferation of systems and their use by different entities and organisations raised a lot of questions about the security...
Authentication code In a military system, authentication should be secure unconditionally. Note that we studied digital signatures and message authentication...
The Clark-Wilson Model Author : Yongge Wang Confidentiality, integrity, and availability are three essential properties for both military and commercial...
We depend more and more on Internet technology. Everyday we interact and perform some tasks related to our life over...
Security has always been a major concern far before the appearance of computers, it had different applications and implementation but...
Microsoft plays a major role in the computing domain and is considered one of the leaders in term of solutions...
Security as a major concern can be addressed from different angles, even the security specialists might have different definitions and...
On Premises Online The SharePoint server farm is within the corporate network. The IT Support team maintains the SharePoint farm...
Attackers might have different reasons to think and try targeting systems. Depending on the technologies and protocols, attackers can use...
We have noticed in the last tens or twenty years a wide use and spread of computer based systems, everywhere,...
Workflow engine, Social oriented, mobile enhanced capabilities ...etc. Live from SPC 20112
Many years ago, I came to the conclusion that thoroughly training end users on SharePoint is a waste of time...
There are couple of definitions for architecture. The most common and used ones are : 1- The fundamental concepts or...
1. Setting up you SPfx Dev Environment Install Node JS Install NodeJS Long Term Support (LTS) version from here...
Author : DAOUDI Samir | Context : MSc Software Engineering - Object Oriented Analysis The user interface is the final representation of our...
Author : DAOUDI Samir | Context : MSc Software Engineering - Object Oriented Analysis Introduction Due to the complexity of some software-solutions and...
