Modern software systems operate under an unprecedented degree of uncertainties, making them hard to specify, model, test, analyze, and verify. Safety assurance of such systems requires efforts that unite different disciplines such as formal method...Loe edasi...
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that wi...Loe edasi...
Written by machine-learning researchers and members of the Android Security team, this all-star guide tackles the analysis and detection of malware that targets the Android operating system.This comprehensive guide to Android malware i...Loe edasi...
Cyber-physical systems (CPSs) consist of software-controlled computing devices communicating with each other and interacting with the physical world through sensors and actuators.Because most of the functionality of a CPS is implemented in...Loe edasi...
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that wi...Loe edasi...
saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
Written by Daniel Yvetot-Thompson and Lucas Fernandes, Tauri Foundations is a journey into the world of Tauri, a desktop app development framework built with security and flexibility in mind. It presents open-source sustainability viewpoints and sec...Loe edasi...
Cyber-physical systems (CPSs) consist of software-controlled computing devices communicating with each other and interacting with the physical world through sensors and actuators. A CPS has, therefore, two parts: The cyber part implementing most o...Loe edasi...
Microservices Security in Action teaches readers how to secure their microservices applications code and infrastructure. After a straightforward introduction to the challenges of microservices security, the book covers fundament...Loe edasi...
The adoption of blockchain for the value chain, insurance, and healthcare domain is flourishing. However, one of the key challenges faced in blockchain development is securing them. The book will cover essential architectural considerations, system...Loe edasi...
Threats to application security continue to evolve just as quickly as the systems that protect against cyber-threats. In many instances, traditional firewalls and other conventional controls can no longer get the job done. The lates...Loe edasi...
Leverage the best techniques provided by Apple to build apps with maximum privacy for your users. This book explores not only the how-to steps for implementing privacy in your apps, but also answers workflow questions about what information you actua...Loe edasi...
Implementing AWS Patterns provides reproducible processes, practices, and blueprints for delivering secure, extensible, cloud-native products. This guide will help you leverage AWS extensive offerings to solve common problems with Amazon Web Service...Loe edasi...
With the digital transformation many organizations are currently going through, they realize that the statement Identity is the new control plane and new perimeter is not just fiction, its reality. This book is a crisp and clear, hands-on guide...Loe edasi...
(Ilmumisaeg: 18-Sep-2018, Paperback / softback, Kirjastus: Microsoft Press, ISBN-13: 9781509307036)
saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
Microsoft Azure Security Center presents comprehensive techniques for using Azure Security Center to protect cloud and hybrid environments. Leading Microsoft security and cloud experts Dr. Thomas Shinder and Yuri Diogen...Loe edasi...
Every day, over half a billion iOS users blindly entrust mobile devices with their personal information. If you write an application that mishandles that information, youll create a goldmine for attackers—and a catastrophe for you and your c...Loe edasi...
Application Security Recipes for JAVA/JEE: A Problem-Solution Approach teaches how to build a highly secure and hack-resistant system using JAVA technology. This book provides end-to-end application security secrets and solutions. It provides a simp...Loe edasi...
Preface Amazingly, I grew up in the country and we never locked the doors to our house, or our cars. In school, no one broke into someone elses car or locker. If you put something down, you could pretty much rely on it being there when you got back...Loe edasi...
Whether hacking of websites is done out of bravado or more malicious motives, such attacks can have a devastating impact. Shema, a San Francisco-based web application security expert, presents examples of different hacks against Web applications (e.g...Loe edasi...
Charlie Miller, Dion Blazakis, Dino DaiZovi, Stefan Esser, Vincenzo Iozzo, Ralf-Philip Weinmann
(Ilmumisaeg: 04-May-2012, Paperback / softback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781118204122)
Describes the security architecture of iOS and offers information on such topics as encryption, jailbreaks, code signing, sandboxing, iPhone fuzzing, and ROP payloads, along with ways to defend iOS devices. Discover all the security risks...Loe edasi...