[도서] 모두의 앱 인벤터

2020-10-29 KENNETH 0

[도서] 모두의 앱 인벤터 분야별 신상품 – 국내도서 – 컴퓨터와 인터넷 [도서]모두의 앱 인벤터 김경민 저 | 길벗 | 2020년 11월 판매가 19,800원 (10%할인) | YES포인트 1,100원(5%지급) 프로그래밍 언어를 전혀 몰라도 OK! 따라 하기만 하면 누구나 안드로이드 앱을 만들 수 있다! 어떤 프로그래밍 언어든 잠깐 배워서는 그 진가를 체험하기가 어렵다. 앱 인벤터는 엔트리, 스크래치처럼 블록 코딩 Source: [도서] 모두의 앱 인벤터

No Image

Bridging the App Modernization Gap, Part 1

2020-10-29 KENNETH 0

Bridging the App Modernization Gap, Part 1 A lot of my work today is helping enterprises to develop and modernize their data strategy. Why? Because although it is clear to many of them that data is increasingly a key business asset, they are not data‑focused when it comes to their technology strategy. The majority of enterprises I speak with still have a traditional approach to delivering technology – they still think about locations and hardware, and are not asking questions about how they want to use data. Because of this, they are potentially limiting their ability to exploit this asset and take advantage of the new opportunities it can present. If they want to fully realize the value of their data, they must start to take a data‑centric approach to IT strategy by developing a strategy focused specifically on data and [ more… ]

No Image

USN-4610-1: fastd vulnerability

2020-10-29 KENNETH 0

USN-4610-1: fastd vulnerability It was discovered that fastd did not properly handle receive buffers under certain circumstances. A remote attacker could possibly use this issue to cause a memory leak, resulting in a denial of service. (CVE-2020-27638) Source: USN-4610-1: fastd vulnerability

[도서] gRPC 시작에서 운영까지

2020-10-29 KENNETH 0

[도서] gRPC 시작에서 운영까지 분야별 신상품 – 국내도서 – 컴퓨터와 인터넷 [도서]gRPC 시작에서 운영까지 카순 인드라시리,다네쉬 쿠루푸 공저/한성곤 역 | 에이콘출판사 | 2020년 11월 판매가 22,500원 (10%할인) | YES포인트 1,250원(5%지급) 클라우드 및 마이크로서비스 아키텍처의 출현으로 오늘날 애플리케이션은 프로세스간 통신 기술을 사용해 연결되며, gRPC는 가장 널리 사용되는 효율적인 통신 기술 중 하나이다. 이 책은 gRPC를 처음 시작하는 아키 Source: [도서] gRPC 시작에서 운영까지

No Image

USN-4609-1: GOsa vulnerabilities

2020-10-29 KENNETH 0

USN-4609-1: GOsa vulnerabilities Fabian Henneke discovered that GOsa incorrectly handled client cookies. An authenticated user could exploit this with a crafted cookie to perform file deletions in the context of the user account that runs the web server. (CVE-2019-14466) It was discovered that GOsa incorrectly handled user access control. A remote attacker could use this issue to log into any account with a username containing the word “success”. (CVE-2019-11187) Fabian Henneke discovered that GOsa was vulnerable to cross-site scripting attacks via the change password form. A remote attacker could use this flaw to run arbitrary web scripts. (CVE-2018-1000528) Source: USN-4609-1: GOsa vulnerabilities