Catalog Search Results
Publisher
Wiley
Pub. Date
©2012
Physical Desc
1 online resource (xx, 388 pages) : illustrations
Language
English
Description
"The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--Page 4 of cover.
Publisher
Syngress Pub
Pub. Date
©2007
Physical Desc
1 online resource (1 volume)
Language
English
Description
"In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to...
Author
Publisher
O'Reilly Media
Pub. Date
2021.
Edition
First edition.
Physical Desc
1 online resource
Language
English
Description
Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vulnerabilities and Exposures (CVEs). Authors Andrew Martin and Michael Hausenblas share best-practice configuration to help you harden clusters from possible...
Author
Series
Publisher
Apress
Pub. Date
©2013
Physical Desc
1 online resource
Language
English
Description
Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent...
Author
Publisher
Pragmatic Bookshelf
Pub. Date
2016.
Edition
Version: P1.0 (January 2016).
Physical Desc
1 online resource (1 volume) : illustrations
Language
English
Description
Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement security best practices and effective countermeasures. Coding securely will make you a stronger web developer...
Author
Publisher
Syngress
Pub. Date
©2012
Physical Desc
1 online resource
Language
English
Description
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in...
Author
Language
English
Description
SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Attacks and Defense, Second Edition is the only book devoted exclusively to this long-established but recently growing threat....
Author
Publisher
O'Reilly Media
Pub. Date
2015.
Edition
First edition.
Physical Desc
1 online resource (1 volume) : illustrations
Language
English
Description
"As a web developer, you may not want to spend time making your web app secure, but it definitely comes with the territory. This practical guide provides you with the latest information on how to thwart security threats at several levels, including new areas such as microservices. You'll learn how to help protect your app no matter where it runs, from the latest smartphone to an older desktop, and everything in between. Author John Paul Mueller delivers...
Author
Publisher
O'Reilly
Pub. Date
2011, ©2012
Edition
1st ed.
Physical Desc
1 online resource (x, 97 pages)
Language
English
Description
With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You'll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker's opportunity to compromise your app and steal user data. How is the Android platform structured to handle security?...
Author
Series
Publisher
Apress
Pub. Date
2020
Edition
Second edition.
Physical Desc
1 online resource
Language
English
Description
Gain the information you need to design secure, useful, high-performing apps that expose end-users to as little risk as possible. This book shows you how to best design and develop Android apps with security in mind: explore concepts that you can use to secure apps and how you can use and incorporate these security features into your apps. You will: Identify data that should be secured Use the Android APIs to ensure confidentiality and integrity of...
Author
Publisher
Apress L.P
Pub. Date
2020
Edition
2nd ed.
Physical Desc
1 online resource (455 pages)
Language
English
Description
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of exploitation. This book teaches you about TLS Token Binding, User Managed Access (UMA) 2.0, Cross Origin Resource Sharing (CORS), Incremental Authorization,...
Author
Language
English
Formats
Description
Do you have difficulty implementing application security into your software development processes? Alice and Bob Learn Application Security shows readers how to "push left" in software, by building security considerations into their system development life cycle, right from the start. You'll learn basic security fundamentals and requirements, as well as secure design concepts, all while benefitting from the code, exercises, and examples interspersed...
Author
Publisher
Syngress Pub
Pub. Date
©2004
Physical Desc
1 online resource (xxiii, 447 pages) : illustrations
Language
English
Description
Hacker Code will have over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, HC1 will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations will be included...
Interlibrary loan through ILLiad
Didn't find what you need? Items not owned by Knox County Public Library can be requested from other libraries to be delivered to your pickup location.
Suggest a purchase
If it is too new for interlibrary loan (6 months), you can place a suggestion with us. Suggest a Purchase