Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SHARKS in the MOAT: How to Create Truly Secure Software

Buy
Believe it or not, there is a striking similarity between medieval castle design and how we protect networks and data in the 21st century. By examining how our ancestors fought off invading armies, it becomes much easier to understand the latest strategies for keeping hackers at-bay. This book is designed for anyone who wants to understand how to create and deploy secure software that can stand up to the most malevolent attacks by the bad guys. Whether you are a PM, product owner, developer, architect, tester, DevOps or infrastructure team member, DBA, engineering manager, security manager, in charge of change management or even a security auditor – there is a mountain of information for you specifically. Obviously, since this is a book on creating secure software, the developer and architect roles have the most information, but even those two roles together represent less than half of the book’s content.As a bonus, once you finish reading the content inside, you will be more than prepared to take the Certified Secure Software Lifecycle Professional exam, or CSSLP exam, if you wish to do so.This book is also available as an audio book read by the author.
(HTML tags aren't allowed.)

An Introduction to PHP for Scientists and Engineers: Beyond JavaScript
An Introduction to PHP for Scientists and Engineers: Beyond JavaScript

This book provides an introduction to PHP and server-side programming. It presents readers with a science or engineering background with the information to write their own online applications requiring reading, creating and manipulating data files stored as text on a server, overcoming the limitations of a client-side language.

It...

Examples and Counterexamples in Graph Theory
Examples and Counterexamples in Graph Theory
It is a real pleasure, indeed an honor, for me to have been invited by Mike Capobianco and John Molluzzo to write an introduction to this imaginative and valuable addition to graph theory. Let me therefore present a few of my thoughts on the current status of graph theory and how their work contributes to the field.

...
Quantum Invariants: A Study of Knot, 3-Manifolds, and Their Sets
Quantum Invariants: A Study of Knot, 3-Manifolds, and Their Sets
Ohtsuk's book is very readable, for he makes an attempt to present the material as straightforward as possible. -- Mathematical Reviews, 2003

This is a nicely written and useful book....presenting a lot of material ordered by a clear guiding line. -- Mathematics Abstracts, 2002

This book provides
...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Uncover, exploit, and close security holes in any software or operating system

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This...

Sputtering by Particle Bombardment: Experiments and Computer Calculations from Threshold to MeV Energies
Sputtering by Particle Bombardment: Experiments and Computer Calculations from Threshold to MeV Energies
Within the last 15 years in the field of “sputtering by particle bombardment” several new and important results have been published in internal reports, in PhD thesis, as well as in the open literature. This relates especially to a more detailed understanding of the sputtering process by computational means such as...
Mac OS X Internals: A Systems Approach
Mac OS X Internals: A Systems Approach

Mac OS X was released in March 2001, but many components, such as Mach and BSD, are considerably older. Understanding the design, implementation, and workings of Mac OS X requires examination of several technologies that differ in their age, origins, philosophies, and roles.

Mac OS X Internals: A Systems...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy