Get practical, hands-on experience in Kubernetes securityfrom mastering the fundamentals to implementing advanced techniques to safeguard your Kubernetes deployments against malicious threats Key Features Understand Kubernetes...Loe edasi...
Modern software systems operate under an unprecedented degree of uncertainties, making them hard to specify, model, test, analyze, and verify. Safety assurance of such systems requires efforts that unite different disciplines such as formal method...Loe edasi...
With the growth of cloud native applications, developers increasingly rely on APIs to make everything work. But security often lags behind, making APIs an attractive target for bad actors looking to access valuable business data. OAuth is a popula...Loe edasi...
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that wi...Loe edasi...
An all-encompassing guide to securing your database and applications against costly cyberattacks! In a time when the average cyberattack costs a company 9.48 million, organizations are desperate for qualified database admin...Loe edasi...
Get up to speed with API security using this comprehensive guide full of best practices for building safer and secure APIs Key Features Develop a profound understanding of the inner workings of APIs with a sharp focus on securi...Loe edasi...
In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security: reconnaissance, offense, and defense. In this revised and updated second edition, he examines dozens of related topics, from...Loe edasi...
(Ilmumisaeg: 21-Nov-2023, Paperback / softback, Kirjastus: Jones and Bartlett Publishers, Inc, ISBN-13: 9781284267952)
Print Textbook amp Cloud Lab Access: 8 -day subscription.The cybersecurity Cloud Labs for Internet and Web Application Security provide fully immersive mock IT infrastructures with live virtual machines and real software, where students will lear...Loe edasi...
Written by machine-learning researchers and members of the Android Security team, this all-star guide tackles the analysis and detection of malware that targets the Android operating system.This comprehensive guide to Android malware i...Loe edasi...
Cyber-physical systems (CPSs) consist of software-controlled computing devices communicating with each other and interacting with the physical world through sensors and actuators.Because most of the functionality of a CPS is implemented in...Loe edasi...
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that wi...Loe edasi...
Stop dangerous threats and secure your vulnerabilities without slowing down delivery. This practical book is a one-stop guide to implementing a robust application security program. Stop dangerous threats and secure your vulnerabilities...Loe edasi...
(Ilmumisaeg: 12-Dec-2022, Paperback / softback, Kirjastus: Jones and Bartlett Publishers, Inc, ISBN-13: 9781284206166)
Internet and Web Application Security, Third Edition provides an in-depth look at how to secure mobile users as customer-facing information migrates from mainframe computers and application servers to Web-enabled applications. Written by industry ex...Loe edasi...
saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
Written by Daniel Yvetot-Thompson and Lucas Fernandes, Tauri Foundations is a journey into the world of Tauri, a desktop app development framework built with security and flexibility in mind. It presents open-source sustainability viewpoints and sec...Loe edasi...
Cyber-physical systems (CPSs) consist of software-controlled computing devices communicating with each other and interacting with the physical world through sensors and actuators. A CPS has, therefore, two parts: The cyber part implementing most o...Loe edasi...
With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requ...Loe edasi...
This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each...Loe edasi...
Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular components architecture and potential default settings and then reviews e...Loe edasi...
With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requ...Loe edasi...