Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust ……続きを見る
Create your own crypto currency by implementing blockchain technology using Java. This step-by-step guide will teach you how to create a user interface using Java FX and implement SQLite DB using JD……続きを見る
Learn how to secure your Java applications from hackers using Spring Security 4.2
About This Book
Architect solutions that leverage the full power of Spring Security while remaining loosely coupled……続きを見る
Refer to this definitive and authoritative book to understand the Jakarta EE Security Spec, with Jakarta Authentication & Authorization as its underlying official foundation. Jakarta EE Security imp……続きを見る
Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement……続きを見る
NOTE: The OCP Java SE 11 Programmer I Exam 1Z0-815 and Programmer II Exam 1Z0-816 have been retired (as of October 1, 2020), and Oracle has released a new Developer Exam 1Z0-819 to replace the previ……続きを見る
Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement……続きを見る
In today's world, smart cards play an increasingly important role in everyday life. We encounter them as credit cards, loyalty cards, electronic purses, health cards, and as secure tokens for authen……続きを見る
著者:Scott Oaks
出版社: O'Reilly Media
発売日: 2013年06月10日
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up t……続きを見る
A sequential and easy-to-follow guide which allows you to understand the concepts related to securing web apps/services quickly and efficiently, since each topic is explained and described with the ……続きを見る
Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This book takes a hands-on approach to Java-based password hashing and authentication……続きを見る
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programmin……続きを見る
“In the Java world, security is not viewed as an add-on a feature. It is a pervasive way of thinking. Those who forget to think in a secure mindset end up in trouble. But just because the facilities……続きを見る
Written by machine-learning researchers and members of the Android Security team, this all-star guide tackles the analysis and detection of malware that targets the Android operating system.
This gr……続きを見る
This open access book describes the most important legal sources and principles of data privacy and data protection in China, Germany and the United States. The authors collected privacy statements ……続きを見る
出版社: Springer International Publishing
発売日: 2016年10月17日
This book constitutes the refereed proceedings of the 11th International Workshop on Security, IWSEC 2016, held in Tokyo, Japan, in September 2016. The 15 regular papers and 4 short papers presented……続きを見る
The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware.
Embedded devices are chip-size m……続きを見る
The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities
More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly movin……続きを見る
Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal in……続きを見る
An introduction to designing and configuring Cisco IPsec VPNs
Understand the basics of the IPsec protocol and learn implementation best practices
Study up-to-date IPsec design, incorporating current……続きを見る
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them
Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “ch……続きを見る
The serious and ever-changing nature of today’s security threats demand a strategic-minded response, and a successful CISO will always be thinking about how to gain business objectives through enabl……続きを見る
Defend against corporate espionage launched from social networks
Protect your organization from devastating social media attacks with instruction from a team of information security experts. Securin……続きを見る
Prinzipiell kann jedes Computerprogramm Schwachstellen enthalten. Auch JavaScript- und HTML5-Code stellen hier keine Ausnahme dar. Im ersten Kapitel dieses shortcuts werden XSS und browserbasierte B……続きを見る
This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to applica……続きを見る
Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provid……続きを見る
This book on smart grid security is meant for a broad audience from managers to technical experts. It highlights security challenges that are faced in the smart grid as we widely deploy it across th……続きを見る
# NOTA IMPORTANTE Este eBook cubre la versión de 1Password para WINDOWS. Si buscas una publicación para dominar 1Password en MAC, busca este mismo título en la iBooks Store.
&i……続きを見る
出版社: Springer International Publishing
発売日: 2015年12月29日
This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in August 2015. The 18 full papers and 3 short papers presented in this volume ……続きを見る