Your one stop guide to automating infrastructure security using DevOps and DevSecOps Key Features Secure and automate techniques to protect …
DevOps engineers, developers, and security engineers have ever-changing roles to play in today's cloud native world. In order to build …
Modernize your apps, run them in containers on Kubernetes, and understand the business value and the nitty-gritty of the VMware …
An essential and up-to-date guide to DevSecOps In The DevSecOps Playbook: Deliver Continuous Security at Speed, the Chief Information and …
et to grips with application security, secure coding, and DevSecOps practices to implement in your development pipeline Key Features Understand …
How do some organizations maintain 24-7 internet-scale operations? How can organizations integrate security while continuously deploying new features? How do …
Manage Power BI within organizations. This book helps you systematize administration as Microsoft shifts Power BI from a self-service tool …
This book brings together an impressive range of academic and intelligence professional perspectives to interrogate the social, ethical and security …
Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides …
This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied Cryptography and Network …
Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level …
Securing DevOps explores how the techniques of DevOps and security should be applied together to make cloud services safer. This …
Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat …
Protect your end users and IT infrastructure against common ransomware attack vectors and efficiently monitor future threatsPurchase of the print …
Some of the United States' greatest challenges over the coming decades are likely to emanate from the Asia-Pacific region. China …
For the past sixty years, the U.S. government has assumed that Japan's security policies would reinforce American interests in Asia. …
This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and …
This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security …
Discover methodologies and best practices for getting started with Google Kubernetes Engine (GKE). This book helps you understand how GKE …
Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along with following cloud security …
Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and …
As more and more organizations migrate their applications to the cloud, cloud native computing has become the dominant way to …
In July 1998, a summer school in cryptology and data security was organized atthecomputersciencedepartmentofAarhusUniversity, Denmark.Thistook place as a part of …
The Chief Java Security Architect at Sun Microsystems, where Java comes from, provides a detailed look at the central workings …
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, …
Carve out your niche in the exploding world of blockchain technology Cryptocurrency, NFTs, smart contracts, and ever-more-important business and finance …
Securing the Chain: Navigating the Future of Blockchain with Confidence KEY FEATURES ● Discover the forefront of blockchain security protocols …
Computing hardware would have no value without software; software tells hardware what to do. Software therefore must have special authority …
Become a Blockchain developer and design, build, publish, test, maintain and secure scalable decentralized Blockchain projects using Bitcoin, Ethereum, NEO, …
Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software security design principles, …
The international relations of the Persian Gulf have long been dominated by power politics. Its unrivalled energy resources have historically …
The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing …
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area …
This book constitutes the thoroughly refereed post-conferenceproceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues …