Let’s understand security flaws in web based applications
Following are stack where we miss security measurements like…
⚫ Poor coding practice
⚫ No encryption of
REST clients are apps that can be used to make HTTP requests to an API. Even though they are often referred to as “REST clients,” they typically can make requests to other types of HTTP APIs as well. As you need to use a REST client to make requests to the APIs you create. This document explains the benefits of a few REST clients. Feel free to choose the REST client that makes sense for you.
Table of Contents
Create the package.json file for your project using below command.
c:\> cd sqlapi-demo
c:\sqlapi-demo> npm init
Then create project structure as give in this picture
CD to root project and run
Some key insight form history
The word ‘risk’ is thought to derive either from the Arabic word ‘risq’ or the Latin word ‘risicum’.
The Latin word ‘risicum’ originally referred to the challenge presented to seafarers by a barrier reef and so implied a possible negative outcome.
Arabic word ‘risq’ ‘anything that has been given to you (by God) and from which you draw profit’
Good risk management isn’t about not taking any risks: it is about taking the right risks where there is an appropriate reward. It is about protecting assets and adding value.
Let’s Determine our Risk Precedence with…
What size is required for all devices?
What is image quality requirement?
Should I create separate images for each of screen sizes?
So, Do I have to worry about all these? and answer is not al all.
xhdpi: 640x960 px
hdpi: 480x800 px
mdpi: 320x480 px
ldpi: 240x320 px
To support these devices, refer to the following developer guides:
Some basic interview question for Exception handling.
Objective type Question
a) An exceptional condition that are external to the application
b) A programming error caused by invalid syntax
c) An error for an invalid array index
a) The error is ignored and the program terminates
b) The jvm calls System.exit with the error status
c) The jvm outputs the exception and a stack trace for the exception
a) System.exit is called
b) An exception is thrown to the calling method
c) An abnormal terminal occurs
a) An exception that the caller is forced to catch or rethrow
b) An exception…
According to the AWS website, the bouquet of featured services includes the following:
Amazon Elastic Compute Cloud…
Mark Richards is a Boston-based software architect who’s been thinking for more than 30 years about how data should flow through software. His book, Software Architecture Patterns, focuses on five architectures that are commonly used to organize software systems. The best way to plan new programs is to study them and understand their strengths and weaknesses.
1) Layered (n-tier) Architecture
2 ) Event-Driven Architecture
3) Microkernel Architecture
4 ) Microservices Architecture
5 ) Space-Based Architecture