Why do you require security policy?

Why do you require security policy?

Secure system planning and administration is the human side of computer security. Even in a highly trusted system, security isn't automatic. Administrators need a written guideline, spelled out beforehand, that… Read more
CMP Versus BMP

CMP Versus BMP

The EJB container handles persistence for entities with CMP, requiring the developer only to implement any logic and define the bean properties to be persisted. In EJB 2.0, the container… Read more
What is Cryptography and Encryption?

What is Cryptography and Encryption?

Encryption is the process of scrambling data (or plain text) into an unreadable form (or cipher text). This scrambling process is based on algorithms that use various forms of substitution… Read more
What are Viruses?

What are Viruses?

A virus is a code fragment that copies itself into a larger program, modifying that program. Unlike a worm, described in the next section, a virus is not an independent… Read more