- Build an LDAP server adapter for IBM Security Identity Manager, then use it to provision user accounts on a test service.
- IBM Security AppScan Source: How to configure your applications for vulnerability scanning and analysis.
- Sentry 2 and PHP: How to implement authentication workflows for a PHP application.
- Sentry 2 and PHP: How you can use Sentry 2 with third-party authentication services.
- Write external authentication interface servers to outsource authentication decisions to a separate module.
- Improve security in your applications by integrating static and dynamic testing in the software cycle.
Security intelligence: 6 guides on building technology
Kane Scarlett 270002Y2HJ Tags:  technology_development security security_intelligence 1,887 Views