Modern software systems operate under an unprecedented degree of uncertainties, making them hard to specify, model, test, analyze, and verify. Safety assurance of such systems requires efforts that unite different disciplines such as formal method...Lasīt vairāk
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that wi...Lasīt vairāk
Written by machine-learning researchers and members of the Android Security team, this all-star guide tackles the analysis and detection of malware that targets the Android operating system.This comprehensive guide to Android malware i...Lasīt vairāk
Cyber-physical systems (CPSs) consist of software-controlled computing devices communicating with each other and interacting with the physical world through sensors and actuators.Because most of the functionality of a CPS is implemented in...Lasīt vairāk
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that wi...Lasīt vairāk
Šī grāmata vairs netiek publicēta. Jums tiks paziņota lietotas grāmatas cena
Written by Daniel Yvetot-Thompson and Lucas Fernandes, Tauri Foundations is a journey into the world of Tauri, a desktop app development framework built with security and flexibility in mind. It presents open-source sustainability viewpoints and sec...Lasīt vairāk
Cyber-physical systems (CPSs) consist of software-controlled computing devices communicating with each other and interacting with the physical world through sensors and actuators. A CPS has, therefore, two parts: The cyber part implementing most o...Lasīt vairāk
Microservices Security in Action teaches readers how to secure their microservices applications code and infrastructure. After a straightforward introduction to the challenges of microservices security, the book covers fundament...Lasīt vairāk
The adoption of blockchain for the value chain, insurance, and healthcare domain is flourishing. However, one of the key challenges faced in blockchain development is securing them. The book will cover essential architectural considerations, system...Lasīt vairāk
Threats to application security continue to evolve just as quickly as the systems that protect against cyber-threats. In many instances, traditional firewalls and other conventional controls can no longer get the job done. The lates...Lasīt vairāk
Leverage the best techniques provided by Apple to build apps with maximum privacy for your users. This book explores not only the how-to steps for implementing privacy in your apps, but also answers workflow questions about what information you actua...Lasīt vairāk
Implementing AWS Patterns provides reproducible processes, practices, and blueprints for delivering secure, extensible, cloud-native products. This guide will help you leverage AWS extensive offerings to solve common problems with Amazon Web Service...Lasīt vairāk
With the digital transformation many organizations are currently going through, they realize that the statement Identity is the new control plane and new perimeter is not just fiction, its reality. This book is a crisp and clear, hands-on guide...Lasīt vairāk
Šī grāmata vairs netiek publicēta. Jums tiks paziņota lietotas grāmatas cena
Microsoft Azure Security Center presents comprehensive techniques for using Azure Security Center to protect cloud and hybrid environments. Leading Microsoft security and cloud experts Dr. Thomas Shinder and Yuri Diogen...Lasīt vairāk
Every day, over half a billion iOS users blindly entrust mobile devices with their personal information. If you write an application that mishandles that information, youll create a goldmine for attackersand a catastrophe for you and your c...Lasīt vairāk
Application Security Recipes for JAVA/JEE: A Problem-Solution Approach teaches how to build a highly secure and hack-resistant system using JAVA technology. This book provides end-to-end application security secrets and solutions. It provides a simp...Lasīt vairāk
Preface Amazingly, I grew up in the country and we never locked the doors to our house, or our cars. In school, no one broke into someone elses car or locker. If you put something down, you could pretty much rely on it being there when you got back...Lasīt vairāk
Whether hacking of websites is done out of bravado or more malicious motives, such attacks can have a devastating impact. Shema, a San Francisco-based web application security expert, presents examples of different hacks against Web applications (e.g...Lasīt vairāk
Charlie Miller, Dion Blazakis, Dino DaiZovi, Stefan Esser, Vincenzo Iozzo, Ralf-Philip Weinmann
(Izdošanas datums: 04-May-2012, Paperback / softback, Izdevniecība: John Wiley & Sons Inc, ISBN-13: 9781118204122)
Describes the security architecture of iOS and offers information on such topics as encryption, jailbreaks, code signing, sandboxing, iPhone fuzzing, and ROP payloads, along with ways to defend iOS devices. Discover all the security risks...Lasīt vairāk