Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security for Software Engineers

Buy
Security for Software Engineers, 9781138583825 (1138583820), CRC Press, 2018

Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry.

The book explores the key areas of attack vectors, code hardening, privacy, and social engineering. Each topic is explored from a theoretical and a practical-application standpoint.

Features:

  • Targets software engineering students - one of the only security texts to target this audience.
  • Focuses on the white-hat side of the security equation rather than the black-hat side.
  • Includes many practical and real-world examples that easily translate into the workplace.
  • Covers a one-semester undergraduate course.
  • Describes all aspects of computer security as it pertains to the job of a software engineer and presents problems similar to that which an engineer will encounter in the industry.

This text will equip students to make knowledgeable security decisions, be productive members of a security review team, and write code that protects a user’s information assets.

(HTML tags aren't allowed.)

Python Projects for Beginners: A Ten-Week Bootcamp Approach to Python Programming
Python Projects for Beginners: A Ten-Week Bootcamp Approach to Python Programming

Immerse yourself in learning Python and introductory data analytics with this book’s project-based approach. Through the structure of a ten-week coding bootcamp course, you’ll learn key concepts and gain hands-on experience through weekly projects.

Each chapter in this book is presented as a full week of...

The Object-Oriented Thought Process (5th Edition) (Developer's Library)
The Object-Oriented Thought Process (5th Edition) (Developer's Library)

Object-oriented programming (OOP) is the foundation of modern programming languages, including C++, Java, C#, Visual Basic .NET, Ruby, Objective-C, and Swift. Objects also form the basis for many web technologies such as JavaScript, Python, and PHP.

 

...
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...

5G LTE Narrowband Internet of Things (NB-IoT)
5G LTE Narrowband Internet of Things (NB-IoT)

This book explains the 3GPP technical specifications for the upcoming 5G Internet of Things (IoT) technology based on latest release which is Release 15. It details the LTE protocol stack of an IoT device, architecture and framework, how they are functioning and communicate with cellular infrastructure, and supported features and...

Programming Persistent Memory: A Comprehensive Guide for Developers
Programming Persistent Memory: A Comprehensive Guide for Developers

Beginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand how persistent memory brings together several new software/hardware requirements, and offers great promise for better performance and faster application startup times?a huge leap forward in byte-addressable...

Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines

Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You’ll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation,...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy