intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Security development lifecycle

Xem 1-11 trên 11 kết quả Security development lifecycle
  • Ebook A developer’s guide to Amazon SimpleDB: Part 1 includes contents: Chapter 6 working beyond the boundaries, chapter 7 planning for the application lifecycle, chapter 8 security in SimpleDB-based applications, chapter 9 increasing performance, chapter 10 writing a SimpleDB Client: a language-independent guide, chapter 11 improving the simpledb client, chapter 12 building a web-Based task list.

    pdf150p haojiubujain08 01-11-2023 7 2   Download

  • Part 1 of ebook "Platform embedded security technology revealed: Safeguarding the future of computing with Intel embedded security and management engine" provides readers with contents including: cyber security in the mobile age; intel’s embedded solutions: from management to security; building blocks of the security and management engine; the engine - safeguarding itself before safeguarding others;...

    pdf120p tieulangtran 28-09-2023 7 3   Download

  • The present contribution proposes introduction of DevOps, an agile methodology for the development and instantiation of software platforms, with minimal impact in any kind of operations environment, for the Next Generation IoT deployments.

    pdf17p vimulcahy 18-09-2023 6 4   Download

  • Ebook Web security: A whitehat perspective – Part 2 includes contents: Chapter 10: Access control, Chapter 11: Encryption algorithms and random numbers, Chapter 12: Web framework security, Chapter 13: Application-layer denial-of-service attacks, Chapter 14: PHP security, Chapter 15: Web server configuration security, Chapter 16: Security of internet business, Chapter 17: Security development lifecycle, Chapter 18: Security operations.

    pdf266p haojiubujain06 06-09-2023 5 4   Download

  • Ebook The data warehouse lifecycle toolkit : Expert methods for designing, developing, and deploying data warehouses – Part 2 includes contents: Chapter 10 - architecture for the front room; chapter 11 - infrastructure and metadata; chapter 12 - a graduate course on the internet and security; chapter 13 - creating the architecture plan and selecting products; chapter 14 - a graduate course on aggregates; chapter 15 - completing the physical design; chapter 16 - data staging; chapter 17 - building end user applications; chapter 18 - planning the deployment; chapter 19 - maintaining and growi...

    pdf205p haojiubujain03 04-08-2023 6 6   Download

  • Ebook "Mastering bitcoin: Programming the open blockchain" includes: a broad introduction of bitcoin and its underlying blockchain—ideal for nontechnical people, investors, and business executives; an explanation of the technical foundations of bitcoin and cryptographic currencies for developers, engineers, and software and systems architects; details of the bitcoin decentralized network. peer-to-peer architecture, transaction lifecycle, and security principles;...

    pdf405p tieuduongchi 07-10-2022 28 7   Download

  • This chapter discusses how to develop a comprehensive network security policy to counter threats against information security. It also teaches you about possible threats and how to describe and implement the process of developing a security policy. It covers the identification of common vulnerabilities and threats, mitigation strategies, and the implementation of a security architecture using a lifecycle approach.

    ppt26p kiepnaybinhyen_02 28-12-2015 61 4   Download

  • Complex software-based systems today power the Nation’s most advanced defense, security, and economic capabilities. Such systems also play central roles in science and engineering discovery, and thus are essential in addressing this century’s grand challenges (e.g., low-cost, carbon-neutral, and renewable energy; clean water; next-generation health care; extreme manufacturing; space exploration, etc.). These large-scale systems typically must remain operational, useful, and relevant for decades.

    pdf80p nhacsihuytuan 13-04-2013 52 4   Download

  • This book is a step-by-step tutorial to developing a real-world application using the Yii web application development framework. The book attempts to mirror the environment of a software development team that is being tasked with building an online application, touching on each aspect of the software development lifecycle, as you build a project task management application from its conception to its production deployment.

    pdf332p hotmoingay3 09-01-2013 202 52   Download

  • Where do mobile apps come from? What is necessary to construct the part of the app that lives on the device, smartphone or tablet, and the part that lives on the server on the backend? What tools are available for the developer for the full application lifecycle? How about testing for all the mobile operating systems and devices?

    pdf19p rose_12 03-12-2012 33 1   Download

  • Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features.

    pdf481p m3onh0x84 10-04-2011 189 50   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
207 tài liệu
1446 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2