Michael Howard - Böcker
378 kr
Skickas inom 7-10 vardagar
189 kr
Skickas
1 062 kr
Skickas inom 3-6 vardagar
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Understand and evaluate the delivery of Carrier Ethernet using different technologies
Carrier Ethernet is rapidly becoming the de facto platform for offering the next generation of high-bandwidth multimedia applications. Delivering Carrier Ethernet: Extending Ethernet Beyond the LAN provides, for the very first time, an in-depth assessment of the various network solutions that can be used to deliver Carrier Ethernet services. The book is based on extensive real-world deployments and is written by globally renowned experts. A standard solution framework is used consistently throughout to address each underlying technology, its benefits and pitfalls, deployment approaches, ongoing developments, economic assessments, and key vendors promoting the solution. The potential evolution of Carrier Ethernet itself is also considered in detail.
CopperHFC (Hybrid Fiber-Coax)PONs (Passive Optical Networks)TDM (Time Division Multiplexing)Fiber and WDM (Wavelength Division Multiplexing)Optical Wireless Mesh Network/Free Space OpticsSONET (Synchronous Optical NETworking)/MSPP (Multi-Service Provisioning Platform)RPR (Resilient Packet Ring)Bridging/SwitchingMPLS (MultiProtocol Label Switching)WiMAX/WiMAC640 kr
Skickas inom 3-6 vardagar
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Eradicate the Most Notorious Insecure Designs and Coding Vulnerabilities
Fully updated to cover the latest security issues, 24 Deadly Sins of Software Security reveals the most common design and coding errors and explains how to fix each one-or better yet, avoid them from the start. Michael Howard and David LeBlanc, who teach Microsoft employees and the world how to secure code, have partnered again with John Viega, who uncovered the original 19 deadly programming sins. They have completely revised the book to address the most recent vulnerabilities and have added five brand-new sins. This practical guide covers all platforms, languages, and types of applications. Eliminate these security flaws from your code:
SQL injection Web server- and client-related vulnerabilitiesUse of magic URLs, predictable cookies, and hidden form fieldsBuffer overrunsFormat string problemsInteger overflowsC++ catastrophesInsecure exception handlingCommand injectionFailure to handle errorsInformation leakageRace conditionsPoor usabilityNot updating easilyExecuting code with too much privilegeFailure to protect stored dataInsecure mobile codeUse of weak password-based systemsWeak random numbersUsing cryptography incorrectlyFailing to protect network trafficImproper use of PKITrusting network name resolution339 kr
Skickas inom 7-10 vardagar
Plan, build, and maintain highly secure Azure applications and workloads
As business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across the entire development lifecycle, and combine multiple Azure services to optimize security. Now, a team of leading Azure security experts shows how to do just that. Drawing on extensive experience securing Azure workloads, the authors present a practical tutorial for addressing immediate security challenges, and a definitive design reference to rely on for years. Learn how to make the most of the platform by integrating multiple Azure security technologies at the application and network layers— taking you from design and development to testing, deployment, governance, and compliance.
About You
This book is for all Azure application designers, architects, developers, development managers, testers, and everyone who wants to make sure their cloud designs and code are as secure as possible.
Discover powerful new ways to:
Improve app / workload security, reduce attack surfaces, and implement zero trust in cloud code Apply security patterns to solve common problems more easily Model threats early, to plan effective mitigations Implement modern identity solutions with OpenID Connect and OAuth2 Make the most of Azure monitoring, logging, and Kusto queries Safeguard workloads with Azure Security Benchmark (ASB) best practices Review secure coding principles, write defensive code, fix insecure code, and test code security Leverage Azure cryptography and confidential computing technologies Understand compliance and risk programs Secure CI / CD automated workflows and pipelines Strengthen container and network security111 kr
Skickas inom 5-8 vardagar
725 kr
Skickas inom 7-10 vardagar
129 kr
Skickas inom 5-8 vardagar
157 kr
Skickas
388 kr
Skickas inom 5-8 vardagar
1 039 kr
Skickas inom 10-15 vardagar
550 kr
Skickas inom 3-6 vardagar
281 kr
Tillfälligt slut
Historical Sensibility
Sir Michael Howard and The International Institute for Strategic Studies, 1958–2019
443 kr
Skickas inom 10-15 vardagar
342 kr
Skickas
2 091 kr
Skickas inom 10-15 vardagar
314 kr
Skickas inom 3-6 vardagar
299 kr
Skickas inom 7-10 vardagar
597 kr
Skickas inom 3-6 vardagar
575 kr
Skickas inom 10-15 vardagar
277 kr
Skickas
Policy Consultancy in Comparative Perspective
Patterns, Nuances and Implications of the Contractor State
323 kr
Skickas inom 7-10 vardagar
3 386 kr
Skickas inom 10-15 vardagar
Policy Consultancy in Comparative Perspective
Patterns, Nuances and Implications of the Contractor State
1 245 kr
Skickas inom 7-10 vardagar
200 kr
Skickas inom 5-8 vardagar
277 kr
Skickas inom 5-8 vardagar
204 kr
Skickas inom 11-20 vardagar
201 kr
Skickas inom 5-8 vardagar
5 168 kr
Skickas inom 7-10 vardagar
259 kr
Skickas inom 7-10 vardagar