Buy nzadev.eu ?

Products related to Security:


  • Paradigms on Technology Development for Security Practitioners
    Paradigms on Technology Development for Security Practitioners

    ?This open access book is authored by a rich mix of contributors from across the landscape of research, academia, LEAs, civil protection, and other first responders, practitioners, public and private organizations and industry to address some of the most contemporary challenges within global security domain.The authors cover topics such as protection of critical infrastructures (CI), serious and organized crime, counter (cyber) terrorism, border management, cybercrime, cybersecurity, management of disasters and crises, big data analytics, the application of AI and the legal and ethical dimensions of the implementation of cutting-edge technologies.The book benefits from research actions and lessons learned from more than 35 EU R&D projects within the security domain.The book not only addresses theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, real world applied solutions, methodologies, and case studies within security domain. This is an open access book.

    Price: 44.99 £ | Shipping*: 0.00 £
  • Identity Security for Software Development : Building with Identity, Secrets, and Credentials
    Identity Security for Software Development : Building with Identity, Secrets, and Credentials

    Maintaining secrets, credentials, and nonhuman identities in secure ways is an important, though often overlooked, aspect of secure software development.Cloud migration and digital transformation have led to an explosion of nonhuman identities—like automation scripts, cloud native apps, and DevOps tools—that need to be secured across multiple cloud and hybrid environments. DevOps security often addresses vulnerability scanning, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches.That's where an identity security strategy focused on secrets management can help. In this practical book, authors John Walsh and Uzi Ailon provide conceptual frameworks, technology overviews, and practical code snippets to help DevSecOps engineers, cybersecurity engineers, security managers, and software developers address use cases across CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, automation/RPA, IOT/OT, and more.You'll learn:The fundamentals of authentication, authorization, access control, and secrets managementWhat developers need to know about managing secrets and identity to build safer appsWhat nonhuman identities, secrets, and credentials are—and how to secure themHow developers work with their cross-function peers to build safer appsHow identity security fits into modern software development practices

    Price: 47.99 £ | Shipping*: 0.00 £
  • Development and Security
    Development and Security


    Price: 65.57 £ | Shipping*: 0.00 £
  • Web Coding & Development All-in-One For Dummies
    Web Coding & Development All-in-One For Dummies

    Learn the in-demand skills that let you turn lines of code into websites and apps Web Coding & Development All-in-One For Dummies is a one-stop resource for would-be developers who need guidance on the languages and steps used to build websites and applications.Learn the coding ropes and expand your existing skillset with this easy-to-understand guide.In these complete mini-books, you’ll walk through the basics of web development, structuring a page, building and processing web forms, and beyond.Learn how to build a website or create your very own app with the advice of web coding and development experts.This edition expands JavaScript and CSS coverage while providing new content on server-side coding and the development stack.Get essential knowledge of how web development works—even if you’ve never written a line of code in your lifeLearn HTML, CSS, JavaScript, and other languages essential for building websites and appsDiscover how to make optimize your sites and apps for mobile devicesExpand on what you already know and improve your employabilityThis Dummies All-in-One is great for you if want to develop coding skills but don’t have a programming background.It’s also perfect for professionals looking to brush up on their web development skills and get up to date on the latest trends and standards.

    Price: 34.99 £ | Shipping*: 0.00 £
  • Which education is suitable for IT security or software development?

    For a career in IT security or software development, a formal education in computer science, information technology, or a related field is typically recommended. A bachelor's degree in computer science can provide a strong foundation in programming, algorithms, and computer systems, which are essential skills for both IT security and software development roles. Additionally, pursuing certifications in cybersecurity or software development can also help enhance your skills and credibility in the field. Ultimately, the most suitable education will depend on your specific career goals and interests within the IT industry.

  • How does coding and code security work?

    Coding involves writing instructions in a programming language to create software or applications. Code security involves implementing measures to protect this code from unauthorized access, modification, or exploitation. This can include using encryption, authentication, and access control mechanisms to safeguard the code and the data it processes. Regular code reviews, testing, and updates are also essential to identify and address vulnerabilities that could be exploited by malicious actors.

  • What security measures should be taken in web development, for example, during login?

    In web development, security measures during login should include implementing secure password storage practices such as hashing and salting passwords to protect user credentials. Additionally, developers should use HTTPS to encrypt data transmitted between the user's browser and the server to prevent eavesdropping. Implementing measures like multi-factor authentication can also enhance security by requiring users to provide additional verification beyond just a password. Regularly updating and patching software to address any security vulnerabilities is crucial to maintaining a secure login system.

  • Which security software do you use?

    I use a combination of security software to ensure comprehensive protection for my devices. This includes antivirus software to protect against malware and viruses, a firewall to monitor and control incoming and outgoing network traffic, and a virtual private network (VPN) to encrypt my internet connection and protect my online privacy. I also regularly update my operating system and software to patch any security vulnerabilities.

Similar search terms for Security:


  • 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
    24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Eradicate the Most Notorious Insecure Designs and Coding VulnerabilitiesFully updated to cover the latest security issues, 24 Deadly Sins of Software Security reveals the most common design and coding errors and explains how to fix each one-or better yet, avoid them from the start.Michael Howard and David LeBlanc, who teach Microsoft employees and the world how to secure code, have partnered again with John Viega, who uncovered the original 19 deadly programming sins.They have completely revised the book to address the most recent vulnerabilities and have added five brand-new sins.This practical guide covers all platforms, languages, and types of applications.Eliminate these security flaws from your code: SQL injection Web server- and client-related vulnerabilitiesUse of magic URLs, predictable cookies, and hidden form fieldsBuffer overrunsFormat string problemsInteger overflowsC++ catastrophesInsecure exception handlingCommand injectionFailure to handle errorsInformation leakageRace conditionsPoor usabilityNot updating easilyExecuting code with too much privilegeFailure to protect stored dataInsecure mobile codeUse of weak password-based systemsWeak random numbersUsing cryptography incorrectlyFailing to protect network trafficImproper use of PKITrusting network name resolution

    Price: 60.99 £ | Shipping*: 0.00 £
  • Web Security For Developers
    Web Security For Developers

    Every website today is vulnerable to attack and a compromised website can ruin a company's reputation.Web Security Basics for Developers covers everything a web developer needs to know about web security.Readers will learn who attackers are and what they have at their disposal, how the Internet and websites operate, and various ways websites get attacked.Author Malcolm McDonald explores common attacks like SQL injection and cross-site scripting, as well as common vulnerabilities like information leakage, offering real-world examples and code samples.

    Price: 28.99 £ | Shipping*: 0.00 £
  • Grokking Web Application Security
    Grokking Web Application Security

    When you launch an application on the web, every hacker in the world has access to it.Are you sure your web apps can stand up to the most sophisticated attacks?Grokking Web Application Security is a brilliantly illustrated and clearly written guide that delivers detailed coverage on: How the browser security model works, including sandboxing, the same-origin policy, and methods of securing cookiesSecuring web servers with input validation, escaping of output, and defense in depthA development process that prevents security bugsProtecting yourself from browser vulnerabilities such as cross-site scripting, cross-site request forgery, and clickjackingNetwork vulnerabilities like man-in-the-middle attacks, SSL-stripping, and DNS poisoningPreventing authentication vulnerabilities that allow brute forcing of credentials by using single sign-on or multi-factor authenticationAuthorization vulnerabilities like broken access control and session jackingHow to use encryption in web applicationsInjection attacks, command execution attacks, and remote code execution attacksMalicious payloads that can be used to attack XML parsers, and file upload functions

    Price: 69.99 £ | Shipping*: 0.00 £
  • AVAST Software ESSENTIAL BUSINESS SECURITY
    AVAST Software ESSENTIAL BUSINESS SECURITY

    AVAST Software ESSENTIAL BUSINESS SECURITY

    Price: 22.86 £ | Shipping*: 0.00 £
  • What is the difference between web development and software development?

    Web development primarily focuses on creating websites and web applications that are accessed through a web browser, using technologies such as HTML, CSS, and JavaScript. Software development, on the other hand, involves creating applications that can run on various platforms, including desktop computers, mobile devices, and servers. While web development is a subset of software development, software development encompasses a broader range of applications beyond just web-based ones.

  • How does the security barrier in the store with alarm and security technology work?

    The security barrier in a store with alarm and security technology typically consists of sensors placed at entry and exit points. These sensors detect when an item with a security tag passes through them without being deactivated at the checkout. When this happens, the sensors trigger an alarm to alert store staff of a potential theft. Additionally, the security tags on items are usually deactivated at the checkout counter using a special device, allowing customers to leave the store without setting off the alarm.

  • What security measures should be taken in web development, for example, in the case of login?

    In web development, several security measures should be implemented for login functionality. These include using HTTPS to encrypt data transmission, implementing strong password policies such as requiring a mix of letters, numbers, and special characters, using multi-factor authentication for an added layer of security, implementing account lockout mechanisms to prevent brute force attacks, and regularly updating and patching software to address any security vulnerabilities. Additionally, developers should avoid storing passwords in plain text and instead use secure hashing algorithms to store and verify passwords.

  • What training opportunities are available for IT specialists to specialize in web development and general programming, such as software development?

    There are various training opportunities available for IT specialists looking to specialize in web development and general programming. Online platforms like Coursera, Udemy, and Codecademy offer courses and certifications in programming languages such as Python, Java, and JavaScript. Additionally, coding bootcamps like General Assembly and Flatiron School provide intensive, hands-on training in software development. IT specialists can also pursue advanced degrees in computer science or related fields to deepen their knowledge and skills in web development and programming.

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.