![](images/graphics/blank.gif)
Access control and security
-
This book covers code examples written in C# with steps on remediating various ASP.NET Core web application vulnerabilities discovered by a secure code review or security test. You'll find practical examples and different ways to solve the security bugs introduced by insecure code in a recipe-style format.
324p
duyhai707
15-07-2024
3
3
Download
-
Part 1 book "Computer security - Principles and practice" includes content: Reader’s and instructor’s guide, overview, cryptographic tools, user authentication, access control, database and cloud security, malicious software, denial of service attacks, intrusion detection, firewalls and intrusion prevention systems, buffer overflow, software security.
436p
muasambanhan10
11-04-2024
5
1
Download
-
Ebook "The web application hackers handbook - Discovering and exploiting security flaws" includes content: Web application (In)security, core defense mechanisms, web application technologies, mapping the application, bypassing client side controls, attacking authentication, attacking session management, attacking access controls, injecting code, exploiting path traversal,... and other contents.
771p
longtimenosee08
31-03-2024
3
1
Download
-
CCSP SECUR Exam Certification Guide is a complete study tool for the CCSP SECUR exam, enabling you to assess your knowledge, identify areas to concentrate your study, and master key concepts to help you succeed on the exams and in your daily job. The book is filled with features that help you master the skills needed to secure Cisco IOS Router networks. This book was developed in cooperation with the Cisco Internet Learning Solutions Group. Cisco Press books are the only self-study books authorized by Cisco for CCSP exam preparation.
505p
longtimenosee08
31-03-2024
5
1
Download
-
Ebook It governance - A managers guide to data security and ISO 2700/ISO 27002 (4th edition): Part 2
Part 2 book "It governance - A managers guide to data security" includes content: Network security management and media handling, exchanges of information, electronic commerce services, E-mail and internet use, access control, network access control, operating system access control, application access control and teleworking, systems acquisition, development and maintenance,.... and other contents.
180p
longtimenosee08
31-03-2024
6
1
Download
-
Ebook Hacking exposed: Linux security secrets solutions - Part 2 includes contents: Chapter 8 elevating user privileges; chapter 9 password cracking; chapter 10 how hackers maintain access; chapter 11 mail and ftp security; chapter 12 web servers and dynamic content; chapter 13 access control and firewalls; appendixe a keeping your programs current; appendixe b turning off unneeded services; appendixe c online resources; appendixe d case studies.
316p
longtimenosee05
31-03-2024
3
0
Download
-
In this book, we cover a wide variety of technologies and show you how to configure those technologies specifically for use in the JBoss Application Server. Naturally, this can’t be done in a vacuum, so we provide simple examples that illustrate the technology and then walk you through the steps necessary to configure things such as deployment descriptors, access control, and encryption. Our intent isn’t to describe every nuance of any particular technology. For that, we recommend that you read books particular to those technologies (and we provide references at the end of most chapters).
496p
longtimenosee05
31-03-2024
1
0
Download
-
Ebook Lift in action: The simply functional web framework for scala – Part 2 includes contents: Chapter 6 common tasks with lift webkit; chapter 7 sitemap and access control; chapter 8 HTTP in lift; chapter 9 AJAX, wiring, and comet; chapter 10 persistence with mapper; chapter 11 persistence with record; chapter 12 localization; chapter 13 distributed messaging and java enterprise integration; chapter 14 application testing; chapter 15 deployment and scaling.
299p
longtimenosee05
31-03-2024
2
0
Download
-
Ebook The SSCP prep guide: Mastering the seven key areas of system security - Part 1 includes contents: Chapter 1 the journey toward information security: an overview; chapter 2 domain 1: access controls; chapter 3 domain 2: administration; chapter 4 domain 3: auditing and monitoring.
235p
longtimenosee05
31-03-2024
3
0
Download
-
In ebook Operating systems and middleware: Supporting controlled interaction – Part 2, the following content will be discussed: Chapter 7 processes and protection; chapter 8 files and other persistent storage; chapter 9 networking; chapter 10 messaging, rpc, and web services; chapter 11 security, chapter 12 stacks.
275p
longtimenosee05
31-03-2024
2
0
Download
-
Ebook PCI compliance: Understand implement effective PCI data security standard compliance - Part 1 includes contents: Chapter 1: about PCI and this book; chapter 2: introduction to fraud, ID theft, and regulatory mandates; chapter 3: why PCI is important; chapter 4: building & maintaining a secure network; chapter 5: protect cardholder data; chapter 6: logging access & events chapter; chapter 7: strong access control.
188p
longtimenosee05
31-03-2024
4
0
Download
-
Ebook Physical logical security convergence: Powered by enterprise security management - Part 2 includes contents: Chapter 8 the new security model: the trusted enterprise; chapter 9 ESM architecture; chapter 10 log collection; chapter 11 real-time event correlation, analysis, and response; chapter 12 event storage and forensic analysis; chapter 13 bridging the chinese wall; chapter 14 physical and logical access; chapter 15 intelligent video analytics; chapter 16 environmental sensors; chapter 17 protecting critical infrastructure: process control and SCADA; chapter 18 final thoughts.
342p
longtimenosee05
31-03-2024
0
0
Download
-
Secure data management in decentralized systems presents a collection of essays, covering a wide range of today's active areas closely related to database security organized as follows. In Part I, We review classical work in database security, and report their recent advances and necessary extensions. In Part 11, We shift our focus to security of the Extensible Markup Language (XML) and other new data models. The need for cross-domain resource and information sharing dramatically changes the approaches to access control.
461p
longtimenosee05
31-03-2024
8
0
Download
-
Ebook "Strategies for achieving food security in Central Asia" summarises the presentations of a NATO Advanced Training Course addressing the issue of food security in Central Asia. The book is divided into two sections. The first provides an overview of the existing aspects of food security in participating Central Asian countries. The emphasis here is on food safety, control and access and includes background information on the relevant food industries.
167p
coduathanh1122
27-03-2024
2
1
Download
-
Ebook The web application hacker’s handbook: Discovering and exploiting security flaws - Part 1 includes contents: Chapter 1: web application (in)security, chapter 2: core defense mechanisms, chapter 3: web application technologies, chapter 4: mapping the application, chapter 5: bypassing client-side controls, chapter 6: attacking authentication, chapter 7: attacking session management, chapter 8: attacking access controls, chapter 9: injecting code.
367p
haojiubujain010
14-12-2023
5
3
Download
-
Part 1 book "Information security management handbook" includes content: Access control systems and methodology; telecommunications, network, and internet security; information security management.
1619p
haojiubujain09
21-11-2023
6
4
Download
-
Firewalls are one of the main components used in securing a network infrastructure, and having an indepth understanding of how these devices function is paramount to maintaining a secure network. This book was written to provide an understanding of the functionality of the Firewall Services Module (FWSM), from both a hardware and software perspective and to be a practical design guide with configuration examples for the design, implementation, operation, and management of FWSM in various deployment scenarios.
519p
haojiubujain09
30-11-2023
7
4
Download
-
Ebook "Field guide to hadoop" includes content: Core technologies, database and data management, serialization, management and monitoring, analytic helpers, data transfer, security, access control, and auditing, cloud computing and virtualization.
132p
haojiubujain07
20-09-2023
6
4
Download
-
Continued part 1, part 2 of ebook "Rational cybersecurity for business: The security leaders’ guide to business alignment" provides readers with contents including: establish a control baseline; simplify and rationalize it and security; control access with minimal drag on the business; institute resilience through detection, response, and recovery; create your rational cybersecurity success plan;...
171p
tieulangtran
28-09-2023
5
4
Download
-
Ebook "Security concepts" includes contents: Metadata, security properties, security models, security concepts, economics of security, adversary modeling, threat modeling, physical security, hardware security, distributed systems, identification and authentication, authorization - access control, secure system administration, logging, reporting, abuse detection, abuse response, forensics, privacy, intrusion response, network security, email security, web security, software security, human factors and usability, attack patterns, trust and personnel security, cryptography, randomness and unpr...
246p
haojiubujain06
05-09-2023
4
3
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)