(Ilmumisaeg: 24-Jul-2025, Paperback / softback, Kirjastus: Jones and Bartlett Publishers, Inc, ISBN-13: 9781284302509)
This book is designed for anyone who wants to gain knowledge and hands-on experience with working, administrating, and managing IT network infrastructure in business organizations. Its perfect for introducing the basics of network security-explorin...Loe edasi...
Get practical, hands-on experience in Kubernetes securityfrom mastering the fundamentals to implementing advanced techniques to safeguard your Kubernetes deployments against malicious threats Key Features Understand Kubernetes...Loe edasi...
Modern software systems operate under an unprecedented degree of uncertainties, making them hard to specify, model, test, analyze, and verify. Safety assurance of such systems requires efforts that unite different disciplines such as formal method...Loe edasi...
Master identity solutions and strategies and prepare to achieve Microsoft Identity and Access Administrator SC-300 certification Purchase of this book unlocks access to web-based exam prep resources such as mock exams, flashcards, and exam tips ...Loe edasi...
With the growth of cloud native applications, developers increasingly rely on APIs to make everything work. But security often lags behind, making APIs an attractive target for bad actors looking to access valuable business data. OAuth is a popula...Loe edasi...
This detailed guide focuses on identifying and countering advanced malware threats on macOS, exploring programming techniques, security tools, real-world evasion strategies, Apple frameworks, and heuristic security methods, making it essential for se...Loe edasi...
Sari: River Publishers Series in Mathematical and Engineering Sciences
(Ilmumisaeg: 07-Feb-2025, Hardback, Kirjastus: River Publishers, ISBN-13: 9788770228626)
This book is an overview of basics and other related fundamentals pertaining to software vulnerability discovery as a process. This collaboration of academia and industry disseminates various practical mathematical modeling-based tools and analyti...Loe edasi...
(Ilmumisaeg: 01-Feb-2025, Other book format, Kirjastus: No Starch Press, ISBN-13: 9781718503793)
Covers programming techniques that can be used to automatically detect malicious code running on a macOS system and the strategies used by actual malware specimens to evade detection. Reviews the operating systems internals and teaches how to devel...Loe edasi...
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that wi...Loe edasi...
In an era defined by rapid digital transformation, Agile Security in the Digital Era: Challenges and Cybersecurity Trends emerges as a pivotal resource for navigating the complex and ever-evolving cybersecurity landscape. This book o...Loe edasi...
This book aims to provide a comprehensive overview of the evolution, trends, techniques, impact on critical infrastructures and national security, countermeasures, and open research directions in this area. It will serve as a valuable source of kn...Loe edasi...
The popularity of Android mobile phones has attracted cybercriminals to create malware applications that carry out various malicious activities. This book will be highly useful for Android malware researchers, developers, students and cyber securi...Loe edasi...
Alfred Basta, Nadine Basta, Waqar Anwar, Mohammad Ilyas Essar
(Ilmumisaeg: 19-Sep-2024, Hardback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781394201600)
A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment In Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Mainta...Loe edasi...
Unlock the full potential of Microsoft Defender for Office 365 with this comprehensive guide, covering its advanced capabilities and effective implementation strategies Key Features Integrate Microsoft Defender for Office 365 f...Loe edasi...
Gain a solid understanding of the threat landscape and discover best practices to protect your software factory throughout the SDLC, with valuable insights from security experts at GitGuardian Key Features Develop a strong secu...Loe edasi...