As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes …
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have …
Hackers know things that you don't. That's their edge. It's the reason that they are able to break into networks, …
Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to …
Key FeaturesThis book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.More than 50 hands-on …
This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as …
"Hacking the Xbox" is a fascinating book about exactly what it says. If you have no interest in gory details …
Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production …
Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) …
Intermediate user level
Automate core security tasks by embedding security controls and processes early in the DevOps workflow through DevSecOps. You will not …
Your one stop guide to automating infrastructure security using DevOps and DevSecOps Key Features Secure and automate techniques to protect …
DevOps engineers, developers, and security engineers have ever-changing roles to play in today's cloud native world. In order to build …
Modernize your apps, run them in containers on Kubernetes, and understand the business value and the nitty-gritty of the VMware …
An essential and up-to-date guide to DevSecOps In The DevSecOps Playbook: Deliver Continuous Security at Speed, the Chief Information and …
et to grips with application security, secure coding, and DevSecOps practices to implement in your development pipeline Key Features Understand …
How do some organizations maintain 24-7 internet-scale operations? How can organizations integrate security while continuously deploying new features? How do …
Manage Power BI within organizations. This book helps you systematize administration as Microsoft shifts Power BI from a self-service tool …
This book brings together an impressive range of academic and intelligence professional perspectives to interrogate the social, ethical and security …
Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides …
This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied Cryptography and Network …
Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level …
Securing DevOps explores how the techniques of DevOps and security should be applied together to make cloud services safer. This …
Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat …
Protect your end users and IT infrastructure against common ransomware attack vectors and efficiently monitor future threatsPurchase of the print …
Some of the United States' greatest challenges over the coming decades are likely to emanate from the Asia-Pacific region. China …
For the past sixty years, the U.S. government has assumed that Japan's security policies would reinforce American interests in Asia. …
This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and …
This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in …
This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security …
Discover methodologies and best practices for getting started with Google Kubernetes Engine (GKE). This book helps you understand how GKE …
Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along with following cloud security …
Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and …
As more and more organizations migrate their applications to the cloud, cloud native computing has become the dominant way to …