Tag it

SOC Reporting Framework

This post introduces to System and Organization Controls (SOC) reporting framework, in the context of compliance with US American law Sarbanes-Oxley Act (SOX). Regulation Context The Sarbanes-Oxley Act (SOX or Sarbox) is a United States of America federal law. It…

JavaScript

JavaScript, commonly abbreviated as JS, is a programming language focused on web development. JavaScript Description JavaScript is a multi-purpose, multi-paradigm, interpreted programming language. It is extensively used on web development as a programming language for the front-end and back-end functionality.…

How to compress PDFs

This post summarizes some ways to compress PDF files. Free methods to compress PDFs Free Online Tools I Love PDF Official website CIB pdf standalone Official website Paid methods to compress PDFs Paid Online Tools Official website Paid Applications Adobe…

Python Development

This post introduces to some aspects of Python development. Python Programming Language Python applications are developed using Python programming language. You can find more information about Python programming language on this post. Integrated Development Environments (IDEs) for Python It is…

Introduction to Django

Django is a back-end web framework written in Python. It follows the model-template-view (MTV) architectural pattern. The Model-Template-View Architecture The Model-Template-View (MTV) architecture separates logically the definitions of a project in the following components: Django apps follows the MTV architecture.…

Source Code Editors

This post lists some source code editors for software development or coding. What is the Difference between a Source Code Editor and an IDE? An Integrated Development Environment (IDE) offers tools to create software projects considering all operative aspects (code,…

AAA Network Protocols

This post summarizes Authentication, Authorization and Accountability (AAA) protocols or AAA network protocols. Do not confuse the AAA protocols with the authentication protocols like EAP, CHAP and PAP. Authentication protocols works in the OSI layers 2 and 3, and AAA…

Identity and Access Management

Identity and Access Management (IAM) is one of the basics of information security. Concepts related to Authentication Continuous authentication Monitors user behavior continuously to ensure that the authenticated user remains the same throughout a session. Risk-based authentication analyzes user behavior…