Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition
This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from... | | Securing the Cloud: Cloud Computer Security Techniques and Tactics
This book will prove to be a practical resource for anyone who is considering
using, building, or securing a cloud implementation. Security professionals may
refer to this book as a source of detailed information for evaluating and verifying
cloud security policy and requirements. Cloud infrastructure engineers, cloud services... | | Federated Identity Primer
The conceptoffederatedidentityisnothingnew.Infact,ithasbeen around alongtime.Itjustneverreallycaughton,partiallybecauseits usage scenarioswerelimited.But,thathaschanged.Nowwiththe increased usageofcloudandInternet-basedapplications,federated identity hasstartedtogainalotoftraction.Instancesoffederated identity ... |