现在位置 >首页 >
所有关于Security的文章
Book Description:
Incorporate security best practices into ASP.NET Core. This book covers security-related features available within the framework, explains where these feature may fall short, and delves into security topics rarely covered elsewhere. Get ready to dive deep into ASP.NET Core 3.1 source code, clarifying how particular features work and addressing how to fix problems.
For straightforward use cases, the ASP.NET Core framework does a good job in preventin...
Book Description:
Website security made easy. This book covers the most common ways websites get hacked and how web developers can defend themselves.
The world has changed. Today, every time you make a site live, you’re opening it up to attack.
A first-time developer can easily be discouraged by the difficulties involved with properly securing a website. But have hope: an army of security researchers is out there discovering, documenting, and fixing security flaws...
Book Description:
After a straightforward introduction to the challenges of microservices security, the book covers fundamentals to secure both the application perimeter and service-to-service communication. Following a hands-on example, readers explore how to deploy and secure microservices behind an API gateway as well as how to access microservices accessed by a single-page application (SPA).
Author:Prabath Siriwardena
ISBN-10:1617295957
Year:2020
...
Book Description:
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.
You’ll review the architecture’s central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You’ll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You’ll then use that information to...
Book Description:
Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory initiatives.
As a solution, Identity Access Management (IAM) has emerged as the cornerstone of enterprise security. Man...
内容简介:
The first comprehensive security resource for Mac and iPhone developers The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.
While Macs are noted ...
作者:Ilia Alshanetsky
页数:200 pages
出版商:Marco Tabini & Associates, Inc.
出版时间:2005.8
语言:英语
ISBN-10: 0973862106
ISBN-13: 978-0973862102
文件大小:5.1 MiB
内容简介:
Security is a hot topic these days, with new exploits and patches released on a daily basis for all sorts of operating systems and applications.
Recently, the security bubble has expanded to touch the PHP world, and several well-known applications have been the target of a g...