现在位置 >首页 >
所有属于网络安全分类文章
Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Today, there is widespread consensus–it is not a matter of if, but rather when an organization will be breached. Threat actors typically target the path of least resistance. With the accelerating adoption of cloud technologies and remote work, the path of least resistance is shifting in substantive ways. In recent years, attackers have realigned...
Understand and stop the hacks you read about in the headlines! This practical guide includes secure code samples, built-in ASP.NET tools, and insider techniques to help your web applications stay safe and secure.
ASP.NET Core Security is a practical and hands-on guide to securing web applications built with ASP.NET. Written by Christian Wenz, a 20-year veteran of web security, it reveals attacks that threaten your apps and introduces the built-in ASP.NET features you ca...
Description:
Distributed and peer-to-peer (P2P) applications are increasing daily, and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain, a decentralized cryptographic-based technology, is a promising element for IoT security in manufacturing, finance, healthcare, supply chain, identity management, e-governance, defence, education, banking, and trading. Blockchain...
Description:
Running cloud native workloads on Kubernetes can be challenging–keeping them secure is even more so. Kubernetes’s complexity offers malicious in-house users and external attackers alike a large assortment of attack vectors. Hacking Kubernetes reviews defaults and threat models and shows how to protect against attacks.
Securing your workloads is both essential and urgent, so this invaluable hands-on guide is available to you in an early release edition b...
Description:
Implement real-time data processing applications on the Raspberry Pi. This book uniquely helps you work with data science concepts as part of real-time applications using the Raspberry Pi as a localized cloud.
You’ll start with a brief introduction to data science followed by a dedicated look at the fundamental concepts of Python programming. Here you’ll install the software needed for Python programming on the Pi, and then review the various data type...
Description:
“Welcome to the eighth edition of Computer Networking: A Top-Down Approach. Since the publication of the first edition 16 years ago, our book has been adopted for use at many hundreds of colleges and universities, translated into 14 languages, and used by over one hundred thousand students and practitioners worldwide. We ve heard from many of these readers and have been overwhelmed by the positive response”
Unique among computer networking texts, the ...
Book Description:
Apply the basics of security in serverless computing to new or existing projects. This hands-on guide provides practical examples and fundamentals. You will apply these fundamentals in all aspects of serverless computing: improving the code, securing the application, and protecting the infrastructure. You will come away having security knowledge that enables you to secure a project you are supporting and have technical conversations with cybersecurity pe...
Book Description:
Website security made easy. This book covers the most common ways websites get hacked and how web developers can defend themselves.
The world has changed. Today, every time you make a site live, you’re opening it up to attack.
A first-time developer can easily be discouraged by the difficulties involved with properly securing a website. But have hope: an army of security researchers is out there discovering, documenting, and fixing security flaws...
Book Description:
After a straightforward introduction to the challenges of microservices security, the book covers fundamentals to secure both the application perimeter and service-to-service communication. Following a hands-on example, readers explore how to deploy and secure microservices behind an API gateway as well as how to access microservices accessed by a single-page application (SPA).
Author:Prabath Siriwardena
ISBN-10:1617295957
Year:2020 ...