• Identity and Data Security for Web Development: Best Practices

    Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how and why everyone working on a system needs to ensure that users and data are protected.Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity... [Read More]

    • ASIN: 1491937017
    • ASIN: 1491937017
    • ISBN: 1491937017
    • Brand: O'Reilly Media
    • Manufacturer: O'Reilly Media

  • AWS: Security Best Practices on AWS: Learn to secure your data, servers, and applications with AWS

    Delve deep into various security aspects of AWS to build and maintain a secured environmentKey FeaturesLearn to secure your network, infrastructure, data, and applications in AWS cloudUse AWS managed security services to automate securityDive deep into various aspects such as the security model, compliance, access management and much more to build and maintain a secured environmentExplore Cloud Adoption Framework (CAF) and its componentsEmbedded with assessments that will help you revise the concepts you have learned in this bookBook DescriptionWith organizations moving their workloads, applic... [Read More]

    • ASIN: 178913451X
    • ASIN: 178913451X
    • ISBN: 178913451X
    • Manufacturer: Packt Publishing

  • Microsoft Azure Security Center (IT Best Practices - Microsoft Press)

    Discover high-value Azure security insights, tips, and operational optimizations This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center’s full spectrum of features and capabilities to address protection, detection, and response in key operational scenarios. You’ll learn how to secure any Azure workload, and optimize virtually all facets of modern security, from policies and identity to incident response and ri... [Read More]

    • ASIN: 1509307036
    • ASIN: 1509307036
    • ISBN: 1509307036
    • Manufacturer: Microsoft Press

  • Web Application Defender's Cookbook: Battling Hackers and Protecting Users

    Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this new book details defensive security methods and can be used as courseware for training network security personnel, web server administrators, and security consultants. Each "recipe" shows you a way to detect and def... [Read More]

    • ASIN: 1118362187
    • ASIN: 1118362187
    • ISBN: 9781118362181
    • Brand: Brand: Wiley
    • Manufacturer: Wiley

  • Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

    Praise for Core Security Patterns Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in order to meet those requirements. Core Security Patterns addresses both aspects of security and will be a guide to developers everywhere in creating more secure applications. --Whitfield Diffie, inventor of Public-Key Cryptography A comprehensive ... [Read More]

    • ASIN: 0131463071
    • ASIN: 0131463071
    • ISBN: 0131463071
    • Manufacturer: Prentice Hall

  • RESTful API Design: Best Practices in API Design with REST (API-University Series Book 3)

    Looking for Best Practices for RESTful APIs?This book is for you! Why? Because this book is packed with practical experience on what works best for RESTful API Design.You want to design APIs like a Pro?Use API description languages to both design APIs and develop APIs efficiently. The book introduces the two most common API description languages RAML, OpenAPI, and Swagger.Your company cares about its customers?Learn API product management with a customer-centric design and development approach for APIs. Learn how to manage APIs as a product and how to follow an API-first approach. Build APIs y... [Read More]

    • ASIN: B01L6STMVW
    • ASIN: B01L6STMVW
    • Manufacturer: API-University Press

  • Cloud Application Architectures: Building Applications and Infrastructure in the Cloud (Theory in Practice (O'Reilly))

    If you're involved in planning IT infrastructure as a network or system architect, system administrator, or developer, this book will help you adapt your skills to work with these highly scalable, highly redundant infrastructure services. While analysts hotly debate the advantages and risks of cloud computing, IT staff and programmers are left to determine whether and how to put their applications into these virtualized services. Cloud Application Architectures provides answers -- and critical guidance -- on issues of cost, availability, performance, scaling, privacy, and security. With Cloud ... [Read More]

    • ASIN: 0596156367
    • UPC: 636920156369
    • ASIN: 0596156367
    • ISBN: 9780596156367
    • Brand: Brand: O'Reilly Media
    • Manufacturer: O'Reilly Media

  • Accumulo: Application Development, Table Design, and Best Practices

    Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Google’s BigTable data storage system. Written by former NSA team members, this comprehensive tutorial and reference covers Accumulo architecture, application development, table design, and cell-level security.With clear information on system administration, performance tuning, and best practices, this book is ideal for developers seeking to write Accumulo applications, administrators charged with installing and maintaining Accumulo, and other professi... [Read More]

    • ASIN: 1449374182
    • ASIN: 1449374182
    • ISBN: 1449374182
    • Manufacturer: O'Reilly Media

  • Modern PHP: New Features and Good Practices

    PHP is experiencing a renaissance, though it may be difficult to tell with all of the outdated PHP tutorials online. With this practical guide, you’ll learn how PHP has become a full-featured, mature language with object-orientation, namespaces, and a growing collection of reusable component libraries.Author Josh Lockhart—creator of PHP The Right Way, a popular initiative to encourage PHP best practices—reveals these new language features in action. You’ll learn best practices for application architecture and planning, databases, security, testing, debugging, and deployment. If you hav... [Read More]

    • ASIN: 1491905018
    • ASIN: 1491905018
    • ISBN: 1491905018
    • Brand: imusti
    • Manufacturer: O'Reilly Media

  • Primer on Client-Side Web Security (SpringerBriefs in Computer Science)

    This volume illustrates the continuous arms race between attackers and defenders of the Web ecosystem by discussing a wide variety of attacks. In the first part of the book, the foundation of the Web ecosystem is briefly recapped and discussed. Based on this model, the assets of the Web ecosystem are identified, and the set of capabilities an attacker may have are enumerated. In the second part, an overview of the web security vulnerability landscape is constructed. Included are selections of the most representative attack techniques reported in great detail. In addition to descriptions of t... [Read More]

    • ASIN: 3319122258
    • ASIN: 3319122258
    • ISBN: 3319122258
    • Manufacturer: Springer

  • AWS Security Best Practices (AWS Whitepaper)

    August 2016This whitepaper provides security best practices that will help you define your Information Security Management System (ISMS) and build a set of security policies and processes for your organization so you can protect your data and assets in the AWS Cloud. It also provides an overview of different security topics such as identifying, categorizing and protecting your assets on AWS, managing access to AWS resources using accounts, users and groups and suggesting ways you can secure your data, your operating systems and applications and overall infrastructure in the cloud.

    • ASIN: B01LX8J2S9
    • ASIN: B01LX8J2S9
    • Manufacturer: Amazon Web Services

  • Drupal Security Best Practices: A Practical Guide

    In looking at the resources available on Drupal security, we found that none of the available resources provided a regularly updated, holistic view. Web security is a complex subject and new challenges are arising all of the time. We saw the need for a resource that would allow Systems Administrators and Web Developers to have a practical view of what they can do to secure their systems. This book is filled with resources to help people security experts understand Drupal & Drupal experts to better understand security.For more information on Drupal security, see http://openconcept.ca

    • ASIN: B015EH48MO
    • ASIN: B015EH48MO
    • Manufacturer: OpenConcept Consulting Inc.

  • Cryptography and Network Security: Principles and Practice (7th Edition)

    The Principles and Practice of Cryptography and Network Security Stallings’ Cryptography and Network Security, Seventh Edition, introduces the reader to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by a network security capability are explored by pr... [Read More]

    • ASIN: 0134444280
    • ASIN: 0134444280
    • ISBN: 0134444280
    • Manufacturer: Pearson

  • Microsoft Windows Security Essentials

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed, ... [Read More]

    • ASIN: 111801684X
    • ASIN: 111801684X
    • ISBN: 111801684X
    • Manufacturer: Sybex

  • Blockchain Applications: A Hands-On Approach

    In the US, the services sector provides employment to about 100 million, while the manufacturing sector provides employment to about 20 million. These sectors are highly automated, and driven by sophisticated business processes forming an integral part of the digital economy. While the applications themselves may be distributed over the Internet in time and space, the core business, regulatory, and financial aspects of the digital economy are still centralized, with the need for centralized agencies (such as banks, customs authorities, and tax agencies) to authenticate and settle payments and ... [Read More]

    • ASIN: 0996025553
    • ASIN: 0996025553
    • ISBN: 0996025553
    • Brand: Unknown
    • Manufacturer: VPT

  • Identity and Data Security for Web Development : Best Practices

    Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security

    • UPC: 50552552

  • Pro Spring Boot 2 : An Authoritative Guide to Building Microservices, Web and Enterprise Applications, and Best Practices

    9781484236758

    • UPC: 935880378

  • Designing Silverlight Business Applications : Best Practices for Using Silverlight Effectively in the Enterprise

    short description is not available

    • UPC: 17335423

  • Web application security: 10 things developers need to know

    Web Application Security and OWASP - Top 10 Security Flaws

    9. Securing Web Applications