Catalog Search Results
Author
Language
English
Description
Prevent (or solve) problems with your Apple ID! Version 3.2, updated January 17, 2022 This book covers everything someone needs to know about configuring an Apple ID account, interactions with iCloud-based services, and troubleshooting account access. Your Apple ID is much more than a simple username. It's a key that unlocks a long list of Apple products and services on any of numerous devices. iCloud uses an Apple ID, as does Apple Music; the App...
Author
Publisher
PACKT PUBLISHING LIMITED
Pub. Date
2023
Edition
1st edition.
Physical Desc
1 online resource
Language
English
Description
Avoid MFA pitfalls--learn how to choose, implement, and troubleshoot MFA in your company Key Features Gain proficiency in using solutions like Okta, Ping Identity, and ForgeRock within the IAM domain Thwart authentication breaches using pragmatic strategies and lessons derived from real-world scenarios Choose the right MFA solutions to enhance your organization's security Book Description MFA has emerged as an essential defense strategy in the wide-ranging...
Author
Publisher
Dpunkt.verlag
Language
Deutsch
Description
Wer als Administrator eine heterogene Netzwerkumgebung mit einheitlicher Benutzerverwaltung betreiben soll, kommt an Netzwerkdiensten wie LDAP und Kerberos nicht vorbei. Das gilt auch für Admins, die sich um die Netzwerkdateisysteme SMB oder NFS kümmern, und für Big-Data-Ingenieure, die für die Sicherheit von Hadoop-Umgebungen zustñdig sind. Dieses Buch behandelt die Grundlagen von Kerberos sowie neue und fortgeschrittene Themen. Praxiskapitel...
Author
Publisher
Syngress
Pub. Date
©2013
Physical Desc
1 online resource : illustrations
Language
English
Description
Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Federated identity links user credentials across multiple systems and services, altering both the utility and security landscape of both. In Federated Identity Primer, Derrick Rountree explains...
Author
Language
English
Formats
Description
A must-read guide to a new and rapidly growing field in cybersecurity In The DevSecOps Playbook: Deliver Continuous Security at Speed, Wiley CISO and CIO Sean D. Mack delivers an expert analysis of how to keep your business secure, relying on the classic triad of people, process, and technology to examine--in depth--every component of DevSecOps. In the book, you'll learn why DevSecOps is as much about people and collaboration as it is about technology...
Author
Publisher
Apress
Pub. Date
[2018]
Physical Desc
1 online resource (xv, 377 pages) : illustrations
Language
English
Description
Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it's now easier than ever to build and operate your own IAM stack. The most common culprit of the largest hacks has been bad personal identification. In terms of bang for your buck, effective access control is the best investment you...
Author
Series
Publisher
Addison-Wesley
Pub. Date
[2017]
Physical Desc
1 online resource (1 streaming video file (3 hr., 38 min., 32 sec.)) : digital, sound, color
Language
English
Description
"Git has emerged as the leading revision control system for open source projects. Git is a distributed revision control and source code management (SCM) system with an emphasis on speed. Git Essentials LiveLessons teaches the skills necessary to version control with git. The first part of the course begins with the basics of Git and how to use it as an individual programmer. Part 1: Git Fundamentals covers installation and setup, fundamental commands,...
Author
Publisher
IT Governance Publishing
Edition
[First edition].
Language
English
Formats
Description
This book is about cyber security. In Part 1, the author discusses his thoughts on the cyber security industry and how those that operate within it should approach their role with the mindset of an artist. Part 2 explores the work of Sun Tzu's The Art of War.
Author
Publisher
Packt
Pub. Date
[2018]
Physical Desc
1 online resource (1 streaming video file (1 hr., 57 min., 58 sec.))
Language
English
Description
"In this course, we'll teach you the basics of using Git and explain how it works. To begin with, we'll show you how to install Git and effectively use your computer's terminal or command line to navigate the file system, and create and edit files. Then we'll cover all the commonly used commands in Git that make up the vast majority of any Software Engineer's workflow. Moving on, we'll explain Git's branching workflow, why it's such a useful feature,...
Author
Publisher
Manning Publications
Language
English
Formats
Description
Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications. Detailed code samples, exercises, and real-world use cases help you put what you've learned into production. Along the way, authors and software security experts Prabath Siriwardena and Nuwan Dias shine a light on important concepts like throttling, analytics gathering, access...
Author
Series
Publisher
Wiley Pub
Pub. Date
©2009
Physical Desc
1 online resource (xvi, 316 pages) : illustrations, charts
Language
English
Description
"Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security....
Interlibrary loan through ILLiad
Didn't find what you need? Items not owned by Knox County Public Library can be requested from other libraries to be delivered to your pickup location.
Suggest a purchase
If it is too new for interlibrary loan (6 months), you can place a suggestion with us. Suggest a Purchase