TC2027

Authentication and Access Control (Part I)

Yesterday on a workshop about a rapid prototyping tool for making web applications, a classmate asked about the options that the tool offered in order to authenticate users. For that the instructor went along to ask us if we knew the difference between authentication and authorization. An easy way to differentiate both is to make… Continue reading Authentication and Access Control (Part I)

Uncategorized

Semana i – PL/SQL, BULK and Context Switch Costs

  At my university we have this week called “semana i” (or innovative week). It is a week in which students can take workshops or courses in the topics they like, independently from the career they are studying. A lot of people use this time to travel and goof around, because there are also attractive… Continue reading Semana i – PL/SQL, BULK and Context Switch Costs

TC2027

The various types of certifications in computer security (individual level)

Hello once more, today we are talking about some of the must’s of  a security expert in order to become a recognized professional, after all this certifications are proof that someone meets the qualifications. Licenses (depending which one) may come from one of the following sources: Schools/Universities Vendors also known as sponsored credentials (e.g. Microsoft,… Continue reading The various types of certifications in computer security (individual level)