itblog.adrian.citu.name
Eclipse BIRT | Adventures in the programming jungle
https://itblog.adrian.citu.name/category/eclipse-birt
Adventures in the programming jungle. How to use an external JavaScript file in a BIRT report. 28 July, 2015. In a recent assignment I had to write some custom Java Script code to treat some table cells from an Eclipse BIRT. This ticket explains the setting of an external Java Script file in a BIRT report. Define the resources folder for your BIRT project. Add the external Java Script file(s) to the BIRT report. 8220;CustomFunctions.js”. Was added an external JavaScript file). Update the BIRT web viewer.
itblog.adrian.citu.name
Business intelligence | Adventures in the programming jungle
https://itblog.adrian.citu.name/tag/business-intelligence-2
Adventures in the programming jungle. How to use an external JavaScript file in a BIRT report. 28 July, 2015. In a recent assignment I had to write some custom Java Script code to treat some table cells from an Eclipse BIRT. This ticket explains the setting of an external Java Script file in a BIRT report. Define the resources folder for your BIRT project. Add the external Java Script file(s) to the BIRT report. 8220;CustomFunctions.js”. Was added an external JavaScript file). Update the BIRT web viewer.
itblog.adrian.citu.name
Web Application Firewall | Adventures in the programming jungle
https://itblog.adrian.citu.name/category/it-security/web-application-firewall
Adventures in the programming jungle. Web Application Firewall (WAF) l’etat de l’art (4). 15 August, 2012. ModSecurity – www.modsecurity.org. Le pare-feu applicatif Web le plus utilisé est ModSecurity qui est un projet open-source. ModSecurity est actuellement maintenu par TrustWave, une société qui vend également des pare-feu applicatifs Web commerciaux. ModSecurity. Microsoft URLScan – http:/ www.iis.net/download/urlscan. Barracuda Networks http:/ www.barracudanetworks.com. La société vend ses produits...
itblog.adrian.citu.name
Aop | Adventures in the programming jungle
https://itblog.adrian.citu.name/category/java/aop-java-2
Adventures in the programming jungle. Aoplib4j-0.0.4 is out! 2 December, 2009. A new version of the aoplib4j. Is out. The library contains (only one) new aspect for transform a test assertion into a verify (see TransformAssertToVerifyForTests. And some other minor changes (see here. Book review: AspectJ in action – Second edition (Part 1 Understanding AOP and AspectJ). 10 September, 2009. Introduction and … conclusion. Since I’m a fan of AOP. And especially of AspectJ. I participated to the MEAP. The cha...
itblog.adrian.citu.name
CISSP | Adventures in the programming jungle
https://itblog.adrian.citu.name/category/certification/cissp
Adventures in the programming jungle. My) CISSP Notes Bibliography. 5 January, 2013. This is the last ticket from/for “(My) CISSP. Notes” and will contains links to the materials that I used for the preparation of the exam. 8211; This was my main source of information. 8211; This was my second source of information; very easy to read and understand but not sufficient to pass the exam. 11th Hour CISSP: Study guide. 8211; This is a short version of the CISSP study guide. McGraw-Hill Education CISSP Podcasts.
itblog.adrian.citu.name
Java | Adventures in the programming jungle
https://itblog.adrian.citu.name/category/java
Adventures in the programming jungle. Book review: Continuous Enterprise Development in Java. 1 February, 2016. This is a very short review of the Continuous Enterprise Development in Java. The book can be easily split in two parts. The first part of the book. From chapter 1 to chapter 4. A very nice introduction is done to the ShrinkWrap. Which is an API to create programmatically deployable JEE archives (jars, wars, ears). The second part of the book. Application, which is the JEE application. Ever...
itblog.adrian.citu.name
Waf | Adventures in the programming jungle
https://itblog.adrian.citu.name/category/it-security/waf
Adventures in the programming jungle. Web Application Firewall (WAF) l’etat de l’art (4). 15 August, 2012. ModSecurity – www.modsecurity.org. Le pare-feu applicatif Web le plus utilisé est ModSecurity qui est un projet open-source. ModSecurity est actuellement maintenu par TrustWave, une société qui vend également des pare-feu applicatifs Web commerciaux. ModSecurity. Microsoft URLScan – http:/ www.iis.net/download/urlscan. Barracuda Networks http:/ www.barracudanetworks.com. La société vend ses produits...
itblog.adrian.citu.name
How to use an external JavaScript file in a BIRT report | Adventures in the programming jungle
https://itblog.adrian.citu.name/2015/07/28/how-to-use-an-external-javascript-file-in-a-birt-report
Adventures in the programming jungle. My) CEH cheat sheet. Introduction to Linux shellcode writing (Part 1) →. How to use an external JavaScript file in a BIRT report. 28 July, 2015. In a recent assignment I had to write some custom Java Script code to treat some table cells from an Eclipse BIRT. This ticket explains the setting of an external Java Script file in a BIRT report. Define the resources folder for your BIRT project. Add the external Java Script file(s) to the BIRT report. When the war file wi...
itblog.adrian.citu.name
Programming | Adventures in the programming jungle
https://itblog.adrian.citu.name/category/programming
Adventures in the programming jungle. Book review: Building microservices (part 1). 4 July, 2016. This is the first part of the review of the Building Microservices. The author is defining the microservices as. 8220;small, autonomous services that work together”. The key benefits of the microservices are:. Technology heterogeneity; use the right tool for the right job. Ease of deployment; microservices are independent by nature so, it can be (re)deployed punctually. Chapter 2: The Evolutionary Architect.
itblog.adrian.citu.name
Certification | Adventures in the programming jungle
https://itblog.adrian.citu.name/category/certification
Adventures in the programming jungle. My) CEH cheat sheet. 22 July, 2015. This is the small (and I hope) useful cheat sheet for the CEH V8. This is strongly inspired from the CEH Certified Ethical Hacker Bundle, Second Edition book. Is one form of an integrity attack. In bit flipping, the attacker isn’t interested in learning the entirety of the plaintext message. There are three main phases to a pen test: preparation. Gray box testing,. EC Council broadly defines four attack types categories:. Generally...