Agile Application Security
Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren't up to speed in t...
Security for Service Oriented Architectures
Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Securi...
Android Application Security
This SpringerBrief explains the emerging cyber threats that undermine Android application security. It further explores the opportunity to leverage the cutting-edge semantics and context-aware techniques to defend against such threats, including z...
iOS Application Security
Eliminating security holes in iOS apps is critical for any developer who wants to protect their users from the bad guys. In iOS Application Security, mobile security expert David Thiel reveals common iOS coding mistakes that create serious securit...
Web Application Security
In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security: reconnaissance, offense, and defense. In this revised and updated second edition, he examines dozens of related topics, from ...
Agile Application Lifecycle Management
Integrate Agile ALM and DevOps to Build Better Software and Systems at Lower Cost Agile Application Lifecycle Management (ALM) is a comprehensive development lifecycle that encompasses essential Agile principles and guides ...
Application Security Program Handbook
Stop dangerous threats and secure your vulnerabilities without slowing down delivery. This practical book is a one-stop guide to implementing a robust application security program.In the Application Security Program Handbook you will learn: Why ap...
Application Security Program Handbook
Stop dangerous threats and secure your vulnerabilities without slowing down delivery. This practical book is a one-stop guide to implementing a robust application security program.Application Security Program Handbook teaches you to imple...
Database and Application Security
An all-encompassing guide to securing your database and applications against costly cyberattacks! ¿ In a time when the average cyberattack costs a company $9.48 million, organizations are desperate for qualified database administrators and ...
Expert Oracle and Java Security
Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities...
Hardware Security Primitives
This book provides an overview of current hardware security primitives, their design considerations, and applications. The authors provide a comprehensive introduction to a broad spectrum (digital and analog) of hardware security primitives and their applications for securing modern devices. Readers will be enabled to understand the various methods for exploiting intrinsic manufacturing and temporal variations in silicon devices to create strong security primitives and solutions. This book will benefit SoC designers and researchers in designing secure, reliable, and trustworthy hardware. * Provides guidance and security engineers for protecting their hardware designs; * Covers a variety digital and analog hardware security primitives and applications for securing modern devices; * Helps readers understand PUF, TRNGs, silicon odometer, and cryptographic hardware design for system security.
Modern Python Standard Library Cookbook
Build optimized applications in Python by smartly implementing the standard library Key Features Strategic recipes for effective application development in Python Techniques to create GUIs and implement security through cryptography Best practices...
Demystifying Cryptography with OpenSSL 3.0
Use OpenSSL to add security features to your application, including cryptographically strong symmetric and asymmetric encryption, digital signatures, SSL/TLS connectivity, and PKI handling Key Features Secure your applications against common netwo...
Agil kravexpert : agilt och krav i praktiken
Agilt och krav, något som både ger möjligheter och utmaningar. Boken ger praktiska erfarenheter och teorier kombinerat med uttalande från två roller i det agila kravarbetet. Iterationer, scrum, användarberättelser, user story mapping, användningsfall, slices och mycket mer för att visualisera och kommunicera hur ett kravarbete kan fungera i en agil miljö.
Agil projektledning, upplaga 5, E-bok
Agil betyder smidig och är benämningen på ett arbetssätt som vuxit fram i it-branschen och på senare år fått fäste i allt fler branscher. Många organisationer vittnar om större engagemang och effektivare projekt sedan man infört en agil syn på planering, förändring, ledarskap och kommunikation.Agil projektledning ger både den teoretiska stommen och praktiska tillämpningen av de agila metoderna. Kärnvärden och tankesätt som ligger till grund för det agila projektarbetet beskrivs utförligt och varvas med konkreta exempel, tillvägagångssätt och verktyg.I femte upplagan presenteras utmaningarna med att skala upp det agila arbetssättet i större organisationer och hur agila metoder kan användas i olika typer av projekt. Ramverket SAFe (Scaled Agile Framework) används som exempel för att visa hur planering och genomförande av projekt kan se ut när flera team samarbetar i större konstellationer.Agil projektledning utsågs till Årets projektledarbok år 2020 av Svenskt Projektforum.
Security Fundamentals for E-commerce
This handbook offers an in-depth understanding of basic security problems and relevant solutions for those charged with maintaining the security of e-commerce sites. From designing secure Web, e-commerce and mobile commerce applications, to securi...
Agile Systems Engineering
Agile Systems Engineering presents a vision of systems engineering where precise specification of requirements, structure, and behavior meet larger concerns as such as safety, security, reliability, and performance in an agile engineering c...
Agile Systems Engineering
Agile Systems Engineering presents a vision of systems engineering where precise specification of requirements, structure, and behavior meet larger concerns as such as safety, security, reliability, and performance in an agile engineering context....
Alice and Bob Learn Application Security
Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Dev...
Web Application Security, A Beginner's Guide
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Security Smarts for the Self-Guided IT Professional...
Alice and Bob Learn Application Security
Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Dev...
Web Application Security is a Stack
This book is intended for application developers, system administrators and operators, as well as networking professionals who need a comprehensive top-level view of web application security in order to better defend and protect both the 'web' and...
Application Security for the Android Platform
This book will educate readers on the need for application security and secure coding practices when designing any app. No prior knowledge of security or secure programming techniques is assumed. The book will discuss the need for such practices, ...
Agile
-
Agile
-
Agile
-
Agile!
Are you attracted by the promises of agile methods but put off by the fanaticism of many agile texts? Would you like to know which agile techniques work, which ones do not matter much, and which ones will harm your projects? Then you need Agile!: ...
Pro Spring 3
The agile, lightweight, open-source Spring Framework continues to be the de facto leading enterprise Java application development framework for today's Java programmers and developers. It works with other leading open-source, agile and lightweight...
Docker on Windows
Learn how to run new and old applications in Docker containers on Windows - modernizing the architecture, improving security and maximizing efficiency. Key Features Run .NET Framework and .NET Core apps in Docker containers for efficiency, securit...
Smart Cards, Tokens, Security and Applications
This book provides a broad overview of the many card systems and solutions that are in practical use today.¿This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment ...
Application of Big Data for National Security
Application of Big Data for National Security provides users with state-of-the-art concepts, methods, and technologies for Big Data analytics in the fight against terrorism and crime, including a wide range of case studies and applic...
Grokking Web Application Security
When you launch an application on the web, every hacker in the world has access to it. Are you sure your web apps can stand up to the most sophisticated attacks? Grokking Web Application Security is a brilliantly illustrated and clearly written guide that delivers detailed coverage on: * How the browser security model works, including sandboxing, the same-origin policy, and methods of securing cookies * Securing web servers with input validation, escaping of output, and defense in depth * A development process that prevents security bugs * Protecting yourself from browser vulnerabilities such as cross-site scripting, cross-site request forgery, and clickjacking * Network vulnerabilities like man-in-the-middle attacks, SSL-stripping, and DNS poisoning * Preventing authentication vulnerabilities that allow brute forcing of credentials by using single sign-on or multi-factor authentication * Authorization vulnerabilities like broken access control and session jacking * How to use
Hacking and Securing IOS Applications
Based on unique and previously undocumented research, this book by noted iOS expert Jonathan Zdziarski shows the numerous weaknesses that exist in typical iPhone and iPad apps. Zdziarski shows finance companies, large institutions and others where...
Oracle Application Express for Mobile Web Applications
Oracle Application Express for Mobile Web Applications is an action driven book, taking you by the hand through all required steps in building your very own web application that will run on phones, tablets, and other mobile devices. Because you've...
Mastering AWS Security
In depth informative guide to implement and use AWS security services effectively. About This Book * Learn to secure your network, infrastructure, data and applications in AWS cloud * Log, monitor and audit your AWS resources for continuous securi...
Mobile Application Hacker's Handbook
See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily pr...
Hands-On Spring Security 5 for Reactive Applications
Secure your Java applications by integrating the Spring Security framework in your code Key Features Provide authentication, authorization and other security features for Java applications. Learn how to secure microservices, cloud, and serverless ...
Implementing DevSecOps Practices
Integrate Shift-Left Security, automation, IaC, and compliance into every stage of development, ensuring strong application security and continuous protection for modern software with DevSecOps best practices Key Features Understand security postu...