• Identity and Data Security for Web Development: Best Practices

    Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how and why everyone working on a system needs to ensure that users and data are protected.Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity... [Read More]

    • ASIN: B01GP09AS6
    • ASIN: B01GP09AS6
    • Manufacturer: O'Reilly Media

  • Django for Beginners: Build websites with Python and Django

    A step-by-step guide to building web applications with Python and Django 2.2.Create, test, and deploy 5 progressively more complex websites including a Message Board app, a Blog app with user accounts, and a robust Newspaper app with reader comments and a complete user registration flow.Along the way you'll learn core Django features and best practices around models, views, templates, urls, custom user models, permissions, authorizations, user registration, testing, and deployment.TABLE OF CONTENTS: Introduction Chapter 1: Initial Setup Chapter 2: Hello World app Chapter 3: Pages app Cha... [Read More]

    • ASIN: B079ZZLRRL
    • ASIN: B079ZZLRRL

  • X-DocuSign-Authentication Best Practices for DocuSignTM via REST or SOAP in 10 minutes: A developer lab from Grigsby Consulting LLC's Integration Cookbook Volume 2

    X-DocuSign-Authentication Best Practices for DocuSign™ via REST or SOAP in 10 minutes, a Best Practices excerpt from Grigsby Consulting LLC’s Integration Cookbook Volume 2 is intended to provide a developer a straight forward tactical example in how best to use the header X-DocuSign-Authentication for DocuSign™ via REST or SOAP in 10 minutes. All the fluff was removed and what was left is a very lean prescriptive Best Practices exampleFeatures I hope you find like I do to be very helpful when learning a new API are in each Developer Lab1. Step-by-Step example with images2. Cut and Paste ... [Read More]

    • ASIN: B01MRX80Y3
    • ASIN: B01MRX80Y3
    • Manufacturer: Grigsby Consulting LLC

  • Build APIs You Won't Hate: Everyone and their dog wants an API, so you should probably learn how to build them

    API development is becoming increasingly common for server-side developers thanks to the rise of front-end JavaScript frameworks, iPhone applications, and API-centric architectures. It might seem like grabbing stuff from a data source and shoving it out as JSON would be easy, but surviving changes in business logic, database schema updates, new features, or deprecated endpoints can be a nightmare. After finding many of the existing resources for API development to be lacking, Phil learned a lot of things the hard way through years of trial and error. This book aims to condense that experience,... [Read More]

    • ASIN: 0692232699
    • ASIN: 0692232699
    • ISBN: 0692232699
    • Manufacturer: Philip J. Sturgeon

  • Securing VoIP: Keeping Your VoIP Network Safe

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company’s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent... [Read More]

    • ASIN: B00Q2N06KI
    • ASIN: B00Q2N06KI
    • Manufacturer: Syngress

  • Understanding Cryptography: A Textbook for Students and Practitioners

    Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, ... [Read More]

    • ASIN: 3642041000
    • ASIN: 3642041000
    • ISBN: 3642041000
    • Brand: imusti
    • Manufacturer: Springer

  • Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings (Lecture Notes in Computer Science)

    The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of i... [Read More]

    • ASIN: 3540255842
    • ASIN: 3540255842
    • ISBN: 3540255842
    • Brand: Brand: Springer
    • Manufacturer: Springer Berlin Heidelberg

  • Social Web And Health Research 1st ed. 2019

    Social Web And Health Research 1st ed.

    • UPC: 122297175

  • Django Design Patterns and Best Practices - Second Edition

    Django Design Patterns and Best Practices - Second

    • UPC: 852744067

  • Django Design Patterns and Best Practices - eBook

    If you want to learn how best to utilize commonly found patterns and learn best practices in developing applications with Django, this is the book for you. This book, like Django itself, is accessible to

    • UPC: 554230149

  • Hands-On RESTful API Design Patterns and Best Practices - eBook

    Build effective RESTful APIs for enterprise with design patterns and REST framework’s out-of-the-box capabilitiesKey FeaturesUnderstand advanced topics such as API gateways, API securities, and cloudImplement patterns programmatically with easy-to-follow examplesModernize legacy codebase using API connectors,

    • UPC: 503359052

  • RESTful Java Patterns and Best Practices - eBook

    This book is aimed at novice developers who want to gain insights into building RESTful services and improve productivity, as well as for advanced developers who want to delve into more complicated

    • UPC: 944434852

  • Hands-On Restful API Design Patterns and Best Practices (Paperback)

    Hands-On RESTful API Design Patterns and Best

    • UPC: 400384077

  • Restful Java Patterns and Best Practices

    9781783287963

    • UPC: 46420944

  • Advanced JAX-RS 22 - REST API Authentication Mechanisms

    Token Based Authentication

    Don't Get Phished: Authentication Best Practices (Cloud Next '18)