styleguide   15505

« earlier    

SPF, DKIM and DMARC brief explanation and best practices
Spam mail messages have been a plague since the Internet became popular and they kept growing more and more as the number of devices and peo...
Spam mail messages have been a plague since the Internet became popular and they kept growing more and more as the number of devices and peo...
bestpractices  styleguide  security  email  devops 
2 days ago by michaelfox
Style Guide Guide | Style Guide Guide
Write an awesome description for your new site here. You can edit this line in _config.yml. It will appear in your document head meta (for Google search results) and in your feed.xml site description.
productdesign  styleguide  webdesign  webdev 
3 days ago by ol
Websites, Please Stop Blocking Password Managers. It’s 2015
Companies are taking away one of the best security measures we have.


refrr:https://www.ncsc.gov.uk/blog-post/let-them-paste-passwords
Companies are taking away one of the best security measures we have.


refrr:https://www.ncsc.gov.uk/blog-post/let-them-paste-passwords
security  bestpractices  styleguide  devops 
3 days ago by michaelfox
End User Devices Security Guidance: Introduction
Getting started with the End User Device security guidance. Information on the aims of the guidance, who it's aimed at, and any assumptions made


refrr:https://www.ncsc.gov.uk/guidance/approaching-enterprise-technology-cyber-security-mind
Getting started with the End User Device security guidance. Information on the aims of the guidance, who it's aimed at, and any assumptions made


refrr:https://www.ncsc.gov.uk/guidance/approaching-enterprise-technology-cyber-security-mind
security  bestpractices  styleguide  devops 
3 days ago by michaelfox
Using IPsec to protect data
Guidance for organisations wishing to deploy or buy network encryption, using IPsec.


refrr:https://www.ncsc.gov.uk/guidance/approaching-enterprise-technology-cyber-security-mind
Guidance for organisations wishing to deploy or buy network encryption, using IPsec.


refrr:https://www.ncsc.gov.uk/guidance/approaching-enterprise-technology-cyber-security-mind
security  bestpractices  styleguide  devops 
3 days ago by michaelfox
Using TLS to protect data
How to configure the services that must be able to receive incoming connections from unknown clients or services.


refrr:https://www.ncsc.gov.uk/guidance/approaching-enterprise-technology-cyber-security-mind
How to configure the services that must be able to receive incoming connections from unknown clients or services.


refrr:https://www.ncsc.gov.uk/guidance/approaching-enterprise-technology-cyber-security-mind
security  bestpractices  styleguide  devops  tls  https 
3 days ago by michaelfox
Security operations centre (SOC) buyers guide
Guidance is for organisations that are considering procuring a Security Operations Centre (SOC) from a third party.


refrr:https://www.ncsc.gov.uk/guidance/approaching-enterprise-technology-cyber-security-mind
Guidance is for organisations that are considering procuring a Security Operations Centre (SOC) from a third party.


refrr:https://www.ncsc.gov.uk/guidance/approaching-enterprise-technology-cyber-security-mind
security  bestpractices  styleguide  devops 
3 days ago by michaelfox
Approaching enterprise technology with cyber security in mind
How organisations can approach enterprise technology in order to deter cyber attacks.


refrr:https://www.ncsc.gov.uk/blog-post/let-them-paste-passwords
How organisations can approach enterprise technology in order to deter cyber attacks.


refrr:https://www.ncsc.gov.uk/blog-post/let-them-paste-passwords
security  bestpractices  styleguide  devops 
3 days ago by michaelfox
Let them paste passwords
this article in Wired

Allow your website to accept pasted passwords - it makes your site more secure, not less.
this article in Wired

Allow your website to accept pasted passwords - it makes your site more secure, not less.
security  bestpractices  styleguide 
3 days ago by michaelfox
google/google-java-format
Contribute to google-java-format development by creating an account on GitHub.
google  java  styleguide  code  formatting 
4 days ago by clehene
Trash Your Servers and Burn Your Code: Immutable Infrastructure and Disposable Components
As a developer and sometimes system administrator, one of the scariest things I ever encounter is a server that’s been running for ages which has seen multip...


refrr:https://simplesecurity.sensedeep.com/web-developer-security-checklist-f2e4f43c9c56
As a developer and sometimes system administrator, one of the scariest things I ever encounter is a server that’s been running for ages which has seen multip...


refrr:https://simplesecurity.sensedeep.com/web-developer-security-checklist-f2e4f43c9c56
bestpractices  styleguide  server  devops  architecture  aws   
4 days ago by michaelfox
How To Secure Your Web App With HTTP Headers
This article reviews key security-related HTTP headers and demonstrates their use in mitigating security vulnerabilities and cyber-attacks.

#https #node-js #security


refrr:https://notifications.google.com/
This article reviews key security-related HTTP headers and demonstrates their use in mitigating security vulnerabilities and cyber-attacks.

#https #node-js #security


refrr:https://notifications.google.com/
javascript  node  security  devops  http  headers  csp  xss  bestpractices  styleguide  checklist 
4 days ago by michaelfox
Style Guide Guide | Style Guide Guide
The homepage of a style guide should provide high-level information around what the design system is, what benefits it provides, who it’s for, and how to get started with it. Like any good index page, it should provide clear navigation to key parts of the website.
styleguide  视觉系统  设计规范  设计语言 
4 days ago by trai25

« earlier    

related tags

(popular  2017  accessibility  aeabos  analytics  architecture  article  atlassian  atomicdesign  awesome  aws  bestpractices  boilerplate  book  bookmarks)  bradfrost  brand  branding  casestudy  cheatsheet  checker  checklist  code  collaboration  components  csp  css  data  debug  deployment  design  designer  designpatterns  designsystem  designsystems  development  devops  dns  documentation  email  es6  examples  firewall  formatting  fridayfrontend  frontend  google  grid  guide  guideline  guidelines  headers  howto  http  https  important  info  inspiration  java  javascript  jekyll  learning  linux  lists  logging  management  marketing  monitoring  mustread  node  ox  patternlibrary  patterns  process  product  productdesign  productdevelopment  react  reference  resource  resources  security  server  sketch  spam  spf  ssh  standard  style  sysadmin  system  table  team  template  tips&tricks  tls  tool  tracking  typeface  ui  useful  ux  web  webdesign  webdev  webdevelopment  work  xss    视觉系统  设计规范  设计语言 

Copy this bookmark:



description:


tags: