• Identity and Data Security for Web Development: Best Practices

    Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how and why everyone working on a system needs to ensure that users and data are protected.Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity... [Read More]

    • ASIN: 1491937017
    • ASIN: 1491937017
    • ISBN: 1491937017
    • Brand: O'Reilly Media
    • Manufacturer: O'Reilly Media

  • AWS: Security Best Practices on AWS: Learn to secure your data, servers, and applications with AWS

    Delve deep into various security aspects of AWS to build and maintain a secured environmentKey FeaturesLearn to secure your network, infrastructure, data, and applications in AWS cloudUse AWS managed security services to automate securityDive deep into various aspects such as the security model, compliance, access management and much more to build and maintain a secured environmentExplore Cloud Adoption Framework (CAF) and its componentsEmbedded with assessments that will help you revise the concepts you have learned in this bookBook DescriptionWith organizations moving their workloads, applic... [Read More]

    • ASIN: 178913451X
    • ASIN: 178913451X
    • ISBN: 178913451X
    • Manufacturer: Packt Publishing

  • AWS Security Best Practices (AWS Whitepaper)

    August 2016This whitepaper provides security best practices that will help you define your Information Security Management System (ISMS) and build a set of security policies and processes for your organization so you can protect your data and assets in the AWS Cloud. It also provides an overview of different security topics such as identifying, categorizing and protecting your assets on AWS, managing access to AWS resources using accounts, users and groups and suggesting ways you can secure your data, your operating systems and applications and overall infrastructure in the cloud.

    • ASIN: B01LX8J2S9
    • ASIN: B01LX8J2S9
    • Manufacturer: Amazon Web Services

  • The Practice of Cloud System Administration: DevOps and SRE Practices for Web Services, Volume 2

    “There’s an incredible amount of depth and thinking in the practices described here, and it’s impressive to see it all in one place.” —Win Treese, coauthor of Designing Systems for Internet Commerce   The Practice of Cloud System Administration, Volume 2, focuses on “distributed” or “cloud” computing and brings a DevOps/SRE sensibility to the practice of system administration. Unsatisfied with books that cover either design or operations in isolation, the authors created this authoritative reference centered on a comprehensive approach.   Case studies and examples fr... [Read More]

    • ASIN: 032194318X
    • ASIN: 032194318X
    • ISBN: 032194318X
    • Brand: Addison-Wesley Professional
    • Manufacturer: Addison-Wesley Professional

  • The DevOps Handbook:: How to Create World-Class Agility, Reliability, and Security in Technology Organizations

    Increase profitability, elevate work culture, and exceed productivity goals through DevOps practices.More than ever, the effective management of technology is critical for business competitiveness. For decades, technology leaders have struggled to balance agility, reliability, and security. The consequences of failure have never been greater―whether it's the healthcare.gov debacle, cardholder data breaches, or missing the boat with Big Data in the cloud.And yet, high performers using DevOps principles, such as Google, Amazon, Facebook, Etsy, and Netflix, are routinely and reliably deploying ... [Read More]

    • ASIN: B01M9ASFQ3
    • ASIN: B01M9ASFQ3
    • Manufacturer: IT Revolution Press

  • Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

    Praise for Core Security Patterns Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in order to meet those requirements. Core Security Patterns addresses both aspects of security and will be a guide to developers everywhere in creating more secure applications. --Whitfield Diffie, inventor of Public-Key Cryptography A comprehensive ... [Read More]

    • ASIN: 0131463071
    • ASIN: 0131463071
    • ISBN: 0131463071
    • Manufacturer: Prentice Hall

  • Microsoft Azure Security Center (IT Best Practices - Microsoft Press)

    Discover high-value Azure security insights, tips, and operational optimizations This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center’s full spectrum of features and capabilities to address protection, detection, and response in key operational scenarios. You’ll learn how to secure any Azure workload, and optimize virtually all facets of modern security, from policies and identity to incident response and ri... [Read More]

    • ASIN: 1509307036
    • ASIN: 1509307036
    • ISBN: 1509307036
    • Manufacturer: Microsoft Press

  • Microsoft Azure Security Infrastructure (IT Best Practices - Microsoft Press)

    Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You’ll learn how to prepare infrastructure with Microsoft’s integrated tools, prebuilt templates, and managed services–and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security a... [Read More]

    • ASIN: 150930357X
    • ASIN: 150930357X
    • ISBN: 150930357X
    • Manufacturer: Microsoft Press

  • AWS Certified Solutions Architect Official Study Guide: Associate Exam (Aws Certified Solutions Architect Official: Associate Exam)

    Validate your AWS skills.  This is your opportunity to take the next step in your career by expanding and validating your skills on the AWS cloud.  AWS has been the frontrunner in cloud computing products and services, and the AWS Certified Solutions Architect Official Study Guide for the Associate exam will get you fully prepared through expert content, and real-world knowledge, key exam essentials, chapter review questions, access to Sybex’s interactive online learning environment, and much more. This official study guide, written by AWS experts, covers exam concepts, and provides key re... [Read More]

    • ASIN: 1119138558
    • ASIN: 1119138558
    • ISBN: 1119138558
    • Brand: Sybex
    • Manufacturer: Sybex

  • Learning Amazon Web Services (AWS): A Hands-On Guide to the Fundamentals of AWS Cloud

    The Practical, Foundational Technical Introduction to the World’s #1 Cloud Platform Includes access to several hours of online training video: Mark Wilkins’ expert training video library guides you through setting up core services and prepares you to deploy your own apps and resources. Learning Amazon Web Services (AWS) is the perfect foundational resource for all administrators, developers, project managers, and other IT professionals who want to plan and deploy AWS services and/or earn AWS certification. Top cloud trainer and evangelist Mark Wilkins teaches best practices that align ... [Read More]

    • ASIN: 0135298342
    • ASIN: 0135298342
    • ISBN: 0135298342
    • Manufacturer: Addison-Wesley Professional

  • The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

    The highly successful security book returns with a new edition, completely updatedWeb applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques... [Read More]

    • ASIN: 1118026470
    • ASIN: 1118026470
    • ISBN: 1118026470
    • Brand: Wiley Publishing
    • Manufacturer: Wiley

  • Web Application Defender's Cookbook: Battling Hackers and Protecting Users

    Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this new book details defensive security methods and can be used as courseware for training network security personnel, web server administrators, and security consultants. Each "recipe" shows you a way to detect and def... [Read More]

    • ASIN: 1118362187
    • ASIN: 1118362187
    • ISBN: 9781118362181
    • Brand: Brand: Wiley
    • Manufacturer: Wiley

  • Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)

    You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn detaile... [Read More]

    • ASIN: 0596802765
    • UPC: 636920802761
    • ASIN: 0596802765
    • ISBN: 0596802765
    • Brand: Brand: O'Reilly Media
    • Manufacturer: O'Reilly Media

  • RESTful API Design: Best Practices in API Design with REST (API-University Series Book 3)

    Looking for Best Practices for RESTful APIs?This book is for you! Why? Because this book is packed with practical experience on what works best for RESTful API Design.You want to design APIs like a Pro?Use API description languages to both design APIs and develop APIs efficiently. The book introduces the two most common API description languages RAML, OpenAPI, and Swagger.Your company cares about its customers?Learn API product management with a customer-centric design and development approach for APIs. Learn how to manage APIs as a product and how to follow an API-first approach. Build APIs y... [Read More]

    • ASIN: B01L6STMVW
    • ASIN: B01L6STMVW
    • Manufacturer: API-University Press

  • The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

    Be online without leaving a trace.Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions. Reading this book, you will learn everything from password protection and smart ... [Read More]

    • ASIN: B01GZY28CW
    • ASIN: B01GZY28CW
    • Manufacturer: Little, Brown and Company

  • Web Content Management : Systems, Features, and Best Practices

    "Looking to select a web content management system (CMS), but confused about the promises, terminology, and buzzwords? Do you want to understand content management without having to dive into the underlying programming? This book provides

    • UPC: 44979023

  • Identity and Data Security for Web Development : Best Practices

    Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security

    • UPC: 50552552

  • Defensive Security Handbook : Best Practices for Securing Infrastructure

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For

    • UPC: 55479617

  • Planning and Response to an Active Shooter: An Interagency Security Committee Policy and Best Practices Guide - Law Enforcement and First Responder Coordination; Run, Hide, Fight Response Plan - eBook

    This report has been professionally converted for accurate flowing-text e-book format reproduction.The primary mission of the ISC Active Shooter Working Group is to streamline existing ISC documents on active shooter into one cohesive policy and

    • UPC: 214608808

  • Even Faster Web Sites : Performance Best Practices for Web Developers

    As an important follow-up to O'Reilly's bestselling "High Performance Web Sites," this second edition offers additional rules for speeding up Web page loading and

    • UPC: 10898275
    • Rating: 5.0

  • Operationalizing Information Security: Putting the Top 10 SIEM Best Practices to Work - eBook

    Applying a top 10 best practices approach to leverage security information event management (SIEM), this e-book offers infosec professionals the means to gain more assured value from SIEM. Whether seeking to streamline incident response, automate

    • UPC: 917148583

  • GWT Best Practices I - eBook

    Für die Kommunikation zwischen Server und Client verwendet Google Web Toolkit (GWT) asynchrone Requests, um diese geht es im ersten Kapitel des shortcuts. In Webapplikationen werden komplexe Sachverhalte abgebildet, was sehr aufwendig sein kann. Doch

    • UPC: 189779000

  • GWT Best Practices II - eBook

    Im zweiten Teil der shortcut-Serie zu GWT Best Practices geht es zunächst um die Verwendung des GWT zur Implementierung von RWD, das aufgrund der zunehmenden Device-Divergenz für eine moderne und professionelle Internetpräsenz notwendig erscheint. Zudem

    • UPC: 839795793

  • SEO Principles 2015: The Best Practice Guide for Individuals and Small Business Owners on a Time Crunch - eBook

    SEO Principles 2015 is a hands on guide for individuals and small businesses that dont have the time to learn all the ins and outs of search engine optimization. This guide will take you through

    • UPC: 761812917

  • Army Cyber Mission Force: Ambitions and Realities: Recruiting, Retaining, and Organizing Personnel, Getting the Best and the Brightest, Need to Depart from Standard Army Personnel Practices - eBook

    The 2010 US Army Training and Doctrine Commands Concept Capability Plan for Cyberspace Operations directed the Army to begin development of a Cyber Mission Force. The direction to build a Cyber Mission Force followed a

    • UPC: 231330152

  • Core Security Patterns : Best Practices and Strategies for J2EE, Web...

    • UPC: 372932803320
    • Category: Nonfiction
    • Price: 5 USD

  • Identity and Data Security for Web Development : Best Practices, Paperback by...

    • UPC: 382718896213
    • Category: Nonfiction
    • Price: 44 USD

  • Identity and Data Security for Web Development: Best Practices by Jonathan LeBla

    • UPC: 361607220085
    • Category: Nonfiction
    • Price: 44 USD

  • Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, ,

    • UPC: 372714079417
    • Category: Non-Fiction
    • Price: 5 GBP

  • NSE8 -Fortinet Network Security Expert 8 Written Exam -BEST Exam Practice Q&A

    • UPC: 223933028020
    • Category: Manuals & Resources
    • Price: 4 USD

  • Identity and Data Security for Web Development: Best Practices.

    • UPC: 183984212994
    • Category: Non-Fiction Books
    • Price: 65 AUD

  • Identity and Data Security for Web Development: Best Practices.

    • UPC: 193372802432
    • Category: Nonfiction
    • Price: 39 USD

  • Core Security Patterns : Best Practices and Strategies for J2EE, Web...

    • UPC: 143426338366
    • Category: Nonfiction
    • Price: 5 USD

  • Core Security Patterns : Best Practices and Strategies for J2EE, Web... (ExLib)

    • UPC: 193321829944
    • Category: Nonfiction
    • Price: 5 USD

  • Identity and Data Security for Web Development : Best Practices, Paperback by...

    • UPC: 263585951702
    • Category: Nonfiction
    • Price: 44 USD

  • Web application security: 10 things developers need to know

    ASP.NET Security Best Practices

    9. Securing Web Applications