-
Azure Security Handbook: A Comprehensive Guide for Defending Your Enterprise Environment
Did you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks? If you did not, you are not alone. In the on-premises world, cybersecurity risks were limited to the organization’s network, but in the era of cloud computing, both the im.... -
Keycloak - Identity and Access Management for Modern Applications
Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in applicationsKey FeaturesGet up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examplesConfigure, manage, and extend Ke.... -
Consumer Protection in E-Retailing in ASEAN
This book examines how consumers are protected on the online marketplace in the context of ASEAN countries.While many sectors have been badly affected by the COVID-19 pandemic, e-retailing is one of the booming sectors during this period. Actually, the e-retailing sector was already booming even bef.... -
Authentication and Access Control: Practical Cryptography Methods and Tools
Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication and access control are the first line of defense to help protect you from being attacked.This book begins with the theoretical background of cryptography and the foundations of authentica.... -
The Enterprise Path to Service Mesh Architectures, 2nd Edition
Author Lee Calcote
Planning to build a microservice-driven cloud native application or looking to modernize existing application services? Consider using a service mesh. A service mesh approach can help you create robust and scalable applications, but it also introduces new challenges. This....
Release Date 2020/11 -
Access Control and Identity Management, 3rd Edition
Author Mike Chapple
Revised and updated with the latest data from this fast paced field, Access Control, Authentication, and Public Key Infrastructure defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact acc....
Release Date 2020/10 -
Author Matthew J. Coles , Izar Tarandach
Threat modeling is one of the most essential—and most misunderstood—parts of the development lifecycle. Whether you’re a security practitioner or application developer, this book will help you gain a better understanding of core concepts and how to apply them to yo....
Release Date 2020/09 -
Implementing Cryptography Using Python
Author Shannon W. Bray
Learn to deploy proven cryptographic tools in your applications and servicesCryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, including programmers, IT admins, and security analysts, need to understand how cr....
Release Date 2020/08 -
Microservices Security in Action
Author Wajjakkara Kankanamge Anthony Nuwan Dias , Prabath Siriwardena
Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications. Detailed code samples, exercises, and real-world use cases help you put what you’ve learned i....
Release Date 2020/08 -
Securing Cloud Services - A pragmatic approach, second edition
Author Lee Newcombe
Securing Cloud Services – A pragmatic guide gives an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud. Manage the risks associated wi....
Release Date 2020/04 -
Author Ric Messier
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Manage your own robust, inexpensive cybersecurity testing environment Thi....
Release Date 2020/02 -
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Author Maciej Machulak , Michael Schwartz
Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate y....
Release Date 2018/12 -
Author Stanley Siegel , Chris Williams , Scott Donaldson
With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and busine....
Release Date 2018/12 -
Author Vimal Kumar , Amartya Sen , Sanjay Madria
The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It ....
Release Date 2018/12 -
Microsoft System Center Data Protection Manager Cookbook
Author Patrick Lownds , Charbel Nemnom
Over 60 recipes to achieve a robust and advanced backup and recovery solution leveraging SCDPM Key FeaturesAdapt to the modern data center design challenges and improve storage efficiency Effective recipes to help you create your own robust architectural designs S....
Release Date 2018/12 -
Hands-On Software Engineering with Python
Author Brian Allbee
Explore various verticals in software engineering through high-end systems using PythonKey FeaturesMaster the tools and techniques used in software engineering Evaluates available database options and selects one for the final Central Office system-components Exper....
Release Date 2018/10 -
Getting Started with z/OS Data Set Encryption
Author Andy Coulson Bill White Jacky Doll , Brad Habbershaw , Cecilia Carranza Lewis , Tho
AbstractThis IBM® Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/O....
Release Date 2018/06 -
Hands-On Cryptography with Python
Author Samuel Bowne
Learn to evaluate and compare data encryption methods and attack cryptographic systemsAbout This BookExplore popular and important cryptographic methodsCompare cryptographic modes and understand their limitationsLearn to perform attacks on cryptographic systemsWho ....
Release Date 2018/06 -
Fixing an Insecure Software Life Cycle
Author April C. Wright
In the race to remain competitive, development teams in many companies are under tremendous pressure to create software on tight deadlines. And in most cases, that means dealing with security bugs only after software is released. But offensive testing and incident ....
Release Date 2018/05 -
Author Michael Collins
Beyond incident response and threat intelligence operations, threat hunting can provide an extra layer of defense for your company’s network. In many organizations, security analysts initiate threat hunting when they spot something weird—network conditions or activ....
Release Date 2018/05 -
Environment Modeling-Based Requirements Engineering for Software Intensive Systems
Author Zhi Jin
Environment Modeling-Based Requirements Engineering for Software Intensive Systems provides a new and promising approach for engineering the requirements of software-intensive systems, presenting a systematic, promising approach to identifying, clarifying, modeling....
Release Date 2018/04 -
Author Toomas Viira
"I loved the quotes at the beginning of each chapter – very interesting and thought-provoking. I also enjoyed the author’s style and his technical expertise shone through," Christopher Wright, Wright CandA Consulting Ltd. Protecting critical information infra....
Release Date 2018/01 -
Visual Cryptography and Secret Image Sharing
Author Ching-Nung Yang , Stelvio Cimato
With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography ....
Release Date 2017/12 -
Author Tsinghua University Tsinghua University Press , Dengguo Feng
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such ....
Release Date 2017/12 -
Author Jean-Philippe Aumasson
"This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You’ll learn about authenticated encryption, secure randomness, hash functions, bl....
Release Date 2017/11 -
Security from First Principles
Author Susan Sons , Craig Jackson , Scott Russell
Today, a spate of best practices guides, checklists, policies, and standards pervade nearly every part of information security practice. Some are well thought out and well written, others less so. How do you evaluate them? This report explores the Information Secur....
Release Date 2017/10 -
Author Amanda Berlin , Lee Brotherston
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to ....
Release Date 2017/04