Get practical, hands-on experience in Kubernetes securityfrom mastering the fundamentals to implementing advanced techniques to safeguard your Kubernetes deployments against malicious threats Key Features Understand Kubernetes...Lasīt vairāk
Modern software systems operate under an unprecedented degree of uncertainties, making them hard to specify, model, test, analyze, and verify. Safety assurance of such systems requires efforts that unite different disciplines such as formal method...Lasīt vairāk
With the growth of cloud native applications, developers increasingly rely on APIs to make everything work. But security often lags behind, making APIs an attractive target for bad actors looking to access valuable business data. OAuth is a popula...Lasīt vairāk
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that wi...Lasīt vairāk
An all-encompassing guide to securing your database and applications against costly cyberattacks! In a time when the average cyberattack costs a company 9.48 million, organizations are desperate for qualified database admin...Lasīt vairāk
Get up to speed with API security using this comprehensive guide full of best practices for building safer and secure APIs Key Features Develop a profound understanding of the inner workings of APIs with a sharp focus on securi...Lasīt vairāk
In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security: reconnaissance, offense, and defense. In this revised and updated second edition, he examines dozens of related topics, from...Lasīt vairāk
(Izdošanas datums: 21-Nov-2023, Paperback / softback, Izdevniecība: Jones and Bartlett Publishers, Inc, ISBN-13: 9781284267952)
Navigate eBook & Cloud Lab Access: 180-day subscription.The cybersecurity Cloud Labs for Internet and Web Application Security provide fully immersive mock IT infrastructures with live virtual machines and real software, where students will learn and...Lasīt vairāk
Written by machine-learning researchers and members of the Android Security team, this all-star guide tackles the analysis and detection of malware that targets the Android operating system.This comprehensive guide to Android malware i...Lasīt vairāk
Cyber-physical systems (CPSs) consist of software-controlled computing devices communicating with each other and interacting with the physical world through sensors and actuators.Because most of the functionality of a CPS is implemented in...Lasīt vairāk
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that wi...Lasīt vairāk
Stop dangerous threats and secure your vulnerabilities without slowing down delivery. This practical book is a one-stop guide to implementing a robust application security program. Stop dangerous threats and secure your vulnerabilities...Lasīt vairāk
(Izdošanas datums: 12-Dec-2022, Paperback / softback, Izdevniecība: Jones and Bartlett Publishers, Inc, ISBN-13: 9781284206166)
Internet and Web Application Security, Third Edition provides an in-depth look at how to secure mobile users as customer-facing information migrates from mainframe computers and application servers to Web-enabled applications. Written by industry ex...Lasīt vairāk
Šī grāmata vairs netiek publicēta. Jums tiks paziņota lietotas grāmatas cena
Written by Daniel Yvetot-Thompson and Lucas Fernandes, Tauri Foundations is a journey into the world of Tauri, a desktop app development framework built with security and flexibility in mind. It presents open-source sustainability viewpoints and sec...Lasīt vairāk
Cyber-physical systems (CPSs) consist of software-controlled computing devices communicating with each other and interacting with the physical world through sensors and actuators. A CPS has, therefore, two parts: The cyber part implementing most o...Lasīt vairāk
With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requ...Lasīt vairāk
This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each...Lasīt vairāk
Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular components architecture and potential default settings and then reviews e...Lasīt vairāk
With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requ...Lasīt vairāk