Virtual Memory — Linux
Introduction It has been a couple of weeks since the last article was published. Recently, I had to dig into[…]
Read moreThe Intersection of Identity, Integration, API Management, and Application Security.
Introduction It has been a couple of weeks since the last article was published. Recently, I had to dig into[…]
Read moreIn the last article, JAAS was introduced. An authenticated calling-entity (perhaps a user), has a JAAS Subject. This JAAS Subject[…]
Read more