• Identity and Data Security for Web Development: Best Practices

    Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how and why everyone working on a system needs to ensure that users and data are protected.Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity... [Read More]

    • ASIN: 1491937017
    • ASIN: 1491937017
    • ISBN: 1491937017
    • Brand: O'Reilly Media
    • Manufacturer: O'Reilly Media

  • Microsoft Azure Security Center (IT Best Practices - Microsoft Press)

    Discover high-value Azure security insights, tips, and operational optimizations This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center’s full spectrum of features and capabilities to address protection, detection, and response in key operational scenarios. You’ll learn how to secure any Azure workload, and optimize virtually all facets of modern security, from policies and identity to incident response and ri... [Read More]

    • ASIN: 1509307036
    • ASIN: 1509307036
    • ISBN: 1509307036
    • Manufacturer: Microsoft Press

  • PHP and MySQL Web Development (5th Edition) (Developer's Library)

    PHP and MySQL Web Development, Fifth Edition The definitive guide to building database-driven Web applications with PHP and MySQL PHP and MySQL are popular open-source technologies that are ideal for quickly developing database-driven Web applications. PHP is a powerful scripting language designed to enable developers to create highly featured Web applications quickly, and MySQL is a fast, reliable database that integrates well with PHP and is suited for dynamic Internet-based applications. PHP and MySQL Web Development shows how to use these tools together to produce effective... [Read More]

    • ASIN: 0321833899
    • ASIN: 0321833899
    • ISBN: 0321833899
    • Brand: Addison-Wesley Professional
    • Manufacturer: Addison-Wesley Professional

  • Modern PHP: New Features and Good Practices

    PHP is experiencing a renaissance, though it may be difficult to tell with all of the outdated PHP tutorials online. With this practical guide, you’ll learn how PHP has become a full-featured, mature language with object-orientation, namespaces, and a growing collection of reusable component libraries.Author Josh Lockhart—creator of PHP The Right Way, a popular initiative to encourage PHP best practices—reveals these new language features in action. You’ll learn best practices for application architecture and planning, databases, security, testing, debugging, and deployment. If you hav... [Read More]

    • ASIN: 1491905018
    • ASIN: 1491905018
    • ISBN: 1491905018
    • Brand: imusti
    • Manufacturer: O'Reilly Media

  • Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management (Sun Core Series)

    Praise for Core Security Patterns Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in order to meet those requirements. Core Security Patterns addresses both aspects of security and will be a guide to developers everywhere in creating more secure applications. --Whitfield Diffie, inventor of Public-Key Cryptography A comprehensive ... [Read More]

    • ASIN: 0133119769
    • ASIN: 0133119769
    • ISBN: 0133119769
    • Brand: Brand: Prentice Hall
    • Manufacturer: Prentice Hall

  • Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

    Praise for Core Security Patterns Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in order to meet those requirements. Core Security Patterns addresses both aspects of security and will be a guide to developers everywhere in creating more secure applications. --Whitfield Diffie, inventor of Public-Key Cryptography A comprehensive ... [Read More]

    • ASIN: 0131463071
    • ASIN: 0131463071
    • ISBN: 0131463071
    • Manufacturer: Prentice Hall

  • Two Scoops of Django: Best Practices for Django 1.8

    Two Scoops of Django 1.11 Now Available! Search for Two Scoops of Django 1.11 to find and purchase the latest edition. Two Scoops of Django: Best Practices For Django 1.8 is full of more material that will help you with your Django projects.We'll introduce you to various tips, tricks, patterns, code snippets, and techniques that we've picked up over the years.We have put thousands of hours into the third edition of the book, writing and revising its material to include significant improvements and new material based on feedback from previous editions.Table of ContentsChapter 1: Coding StyleCha... [Read More]

    • ASIN: 0981467342
    • ASIN: 0981467342
    • ISBN: 0981467342
    • Manufacturer: Two Scoops Press

  • RESTful API Design: Best Practices in API Design with REST (API-University Series Book 3)

    Looking for Best Practices for RESTful APIs?This book is for you! Why? Because this book is packed with practical experience on what works best for RESTful API Design.You want to design APIs like a Pro?Use API description languages to both design APIs and develop APIs efficiently. The book introduces the two most common API description languages RAML, OpenAPI, and Swagger.Your company cares about its customers?Learn API product management with a customer-centric design and development approach for APIs. Learn how to manage APIs as a product and how to follow an API-first approach. Build APIs y... [Read More]

    • ASIN: B01L6STMVW
    • ASIN: B01L6STMVW
    • Manufacturer: API-University Press

  • Drupal Security Best Practices: A Practical Guide

    In looking at the resources available on Drupal security, we found that none of the available resources provided a regularly updated, holistic view. Web security is a complex subject and new challenges are arising all of the time. We saw the need for a resource that would allow Systems Administrators and Web Developers to have a practical view of what they can do to secure their systems. This book is filled with resources to help people security experts understand Drupal & Drupal experts to better understand security.For more information on Drupal security, see http://openconcept.ca

    • ASIN: B015EH48MO
    • ASIN: B015EH48MO
    • Manufacturer: OpenConcept Consulting Inc.

  • Accumulo: Application Development, Table Design, and Best Practices

    Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Google’s BigTable data storage system. Written by former NSA team members, this comprehensive tutorial and reference covers Accumulo architecture, application development, table design, and cell-level security.With clear information on system administration, performance tuning, and best practices, this book is ideal for developers seeking to write Accumulo applications, administrators charged with installing and maintaining Accumulo, and other professi... [Read More]

    • ASIN: 1449374182
    • ASIN: 1449374182
    • ISBN: 1449374182
    • Manufacturer: O'Reilly Media

  • AWS Security Best Practices (AWS Whitepaper)

    August 2016This whitepaper provides security best practices that will help you define your Information Security Management System (ISMS) and build a set of security policies and processes for your organization so you can protect your data and assets in the AWS Cloud. It also provides an overview of different security topics such as identifying, categorizing and protecting your assets on AWS, managing access to AWS resources using accounts, users and groups and suggesting ways you can secure your data, your operating systems and applications and overall infrastructure in the cloud.

    • ASIN: B01LX8J2S9
    • ASIN: B01LX8J2S9
    • Manufacturer: Amazon Web Services

  • Cloud Application Architectures: Building Applications and Infrastructure in the Cloud (Theory in Practice (O'Reilly))

    If you're involved in planning IT infrastructure as a network or system architect, system administrator, or developer, this book will help you adapt your skills to work with these highly scalable, highly redundant infrastructure services. While analysts hotly debate the advantages and risks of cloud computing, IT staff and programmers are left to determine whether and how to put their applications into these virtualized services. Cloud Application Architectures provides answers -- and critical guidance -- on issues of cost, availability, performance, scaling, privacy, and security. With Cloud ... [Read More]

    • ASIN: 0596156367
    • UPC: 636920156369
    • ASIN: 0596156367
    • ISBN: 9780596156367
    • Brand: Brand: O'Reilly Media
    • Manufacturer: O'Reilly Media

  • CISSP Practice Exams, Second Edition

    Written by the #1 name in IT security certification training, fully revised for the latest exam release, and featuring 750+ practice questions plus 24 hours of audio lectures CISSP Practice Exams, Second Edition is the ideal companion to Shon Harris’ bestselling CISSP All-in-One Exam Guide. Well-regarded for her engaging and informative style, Shon Harris is renowned as an IT security certification expert. Designed as an exam-focused study-self aid and resource, CISSP Practice Exams, Second Edition provides 100% coverage of the 10 exam domains. Organized by these domains, the book allows you... [Read More]

    • ASIN: 0071792341
    • ASIN: 0071792341
    • ISBN: 0071792341
    • Manufacturer: McGraw-Hill Education

  • CompTIA Security+ SYO-401 Exam Cram (4th Edition)

    CompTIA® Security+ Exam Cram, Fourth Edition, is the perfect study guide to help you pass CompTIA’s newly updated version of the Security+ exam. It provides coverage and practice questions for every exam topic. The book contains a set of 200 questions in two full practice exams. The CD-ROM contains the powerful Pearson IT Certification Practice Test engine that provides real-time practice and feedback with all the questions so you can simulate the exam. Covers the critical information you need to know to score higher on your Security+ exam! --Categorize types of attacks, threats, an... [Read More]

    • ASIN: 0789753340
    • ASIN: 0789753340
    • ISBN: 0789753340
    • Manufacturer: Pearson IT Certification

  • Threat Modeling: Designing for Security

    The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs aga... [Read More]

    • ASIN: 1118809998
    • UPC: 001118809998
    • ASIN: 1118809998
    • ISBN: 1118809998
    • Brand: imusti
    • Manufacturer: Wiley

  • Identity and Data Security for Web Development : Best Practices

    Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security

    • UPC: 50552552

  • Collaborative Web Development: Strategies and Best Practices for Web Teams [With CDROM]

    Collaborative Web Development: Strategies and Best Practices for Web

    • UPC: 24655346

  • Designing Silverlight Business Applications : Best Practices for Using Silverlight Effectively in the Enterprise

    short description is not available

    • UPC: 17335423

  • Identity and Data Security for Web Development : Best Practices, Paperback by...

    • UPC: 382718896213
    • Category: Nonfiction
    • Price: 40 USD

  • Identity and Data Security for Web Development: Best Practices by Jonathan LeBla

    • UPC: 361607220085
    • Category: Nonfiction
    • Price: 44 USD

  • Identity and Data Security for Web Development: Best Practices.

    • UPC: 183984212994
    • Category: Non-Fiction Books
    • Price: 53 AUD

  • Identity and Data Security for Web Development: Best Practices.

    • UPC: 193372802432
    • Category: Nonfiction
    • Price: 32 USD

  • Identity and Data Security for Web Development : Best Practices, Paperback by...

    • UPC: 263585951702
    • Category: Nonfiction
    • Price: 40 USD

  • Identity and Data Security for Web Development: Best Practices.

    • UPC: 254428855593
    • Category: Nonfiction
    • Price: 54 CAD

  • Web application security: 10 things developers need to know

    9. Securing Web Applications

    10 things developers need to know about web application security by Nanne Baars