The objective of this scientific work is to research, test and develop an approach and design a safety architecture for highly safe, available and autonomous systems with regard to functional safety using degradation concepts. A novel, safety-orie...Loe edasi...
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that wi...Loe edasi...
Work with over 150 real-world examples of threat manifestation in software development and identify similar design flaws in your systems using the EoP game, along with actionable solutions Key Features Apply threat modeling pri...Loe edasi...
Before an enterprise answers “How can we achieve a Zero Trust architecture?” they should be asking “Why are we looking at Zero Trust as an access model? Does it align with our vision?” In an innovative format, Cisco security architecture expert Av...Loe edasi...
Improve cloud security within your organization by leveraging AWS’s Shared Responsibility Model, Well-Architected Framework, and the Cloud Adoption Framework. This book will show you to use these tools to make the best decisions for sec...Loe edasi...
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that wi...Loe edasi...
Microservices Security in Action teaches readers how to secure their microservices applications code and infrastructure. After a straightforward introduction to the challenges of microservices security, the book covers fundament...Loe edasi...
Kubernetes is a widely used opensource orchestration platform for managing container applications. Developers are not yet aware of the pitfalls of a containerized environment. This book takes you through core security principles, best practices, and...Loe edasi...
Now that information has become the lifeblood of your organization, you must be especially vigilant about assuring it. The hacker, spy, or cyber-thief of today can breach any barrier if it remains unchanged long enough or has even the tiniest leak...Loe edasi...
Implementing AWS Patterns provides reproducible processes, practices, and blueprints for delivering secure, extensible, cloud-native products. This guide will help you leverage AWS extensive offerings to solve common problems with Amazon Web Service...Loe edasi...
Cyber-attacks continue to rise as more individuals rely on storing personal information on networks. Even though these networks are continuously checked and secured, cybercriminals find new strategies to break through these protections. Thus, advanc...Loe edasi...
Discusses the development of security-aware software systems that are built into every phase of the software architecture. Featuring research on topics such as migration techniques, service-based software, and building security, this book is designe...Loe edasi...
This book explores security in software architecture and design. It examines software security from a software engineering perspective and addresses technical, as well as managerial aspects of secure software engineering. It also includes all aspect...Loe edasi...
Configuration Management (CM) tools help administrators reduce their workload. Ansible is one of the best Configuration Management tools, and can act as an orchestrator for managing other CMs. This book is the easiest way to learn how to use Ansible...Loe edasi...
The Internet of Things (IoT) is the most significant factor in the technology industry in the last 10 years. It will usher in the third industrial revolution and significantly impact global economies. Industry giants are in the process of adopting I...Loe edasi...
Providing a comprehensive guide to security for web services and SOA, this book covers in detail all recent standards that address web service security, including XML Encryption, XML Signature, WS-Security, and WS-SecureConversation. It also reviews...Loe edasi...
(Ilmumisaeg: 19-Apr-2013, Hardback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781119998945)
Learn to combine security theory and code to produce secure systemsSecurity is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used...Loe edasi...
Thuraisingham (engineering and computer science, U. of Texas-Dallas) reviews developments in Web services technologies and describes ways of securing these technologies. Her focus is on confidentiality, privacy, trust, and integrity management for We...Loe edasi...
(Ilmumisaeg: 16-Jul-2010, Hardback, Kirjastus: ISTE Ltd and John Wiley & Sons Inc, ISBN-13: 9781848211971)
It is currently quite easy for students or designers/engineers to find very general books on the various aspects of safety, reliability and dependability of computer system architectures, and partial treatments of the elements that comprise an effect...Loe edasi...