wyszukanych pozycji: 6
![]() |
IAM and PAM Cybersecurity
ISBN: 9798868820182 / Angielski / Miękka / 135 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych (Bez gwarancji dostawy przed świętami) In today s digital age, organizations face growing cyber threats targeting user identities and access credentials. Identity and Access Management (IAM) helps secure identities, manage privileges, and enforce security policies making it essential for zero-trust security, compliance, and efficiency. Privileged Access Management (PAM), a specialized branch of IAM, focuses on protecting and monitoring privileged accounts such as administrators, root users, and service accounts. Because these accounts have elevated access, they are prime targets for... In today s digital age, organizations face growing cyber threats targeting user identities and access credentials. Identity and Access Mana... |
cena:
88,35 zł |
![]() |
Industrial Control System (ICS) and Operational Technology (OT) Security
ISBN: 9798868820151 / Angielski / Miękka / 137 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych (Bez gwarancji dostawy przed świętami) Operational Technology (OT) refers to hardware and software used to monitor, control, and manage industrial processes, infrastructure, and assets across sectors like manufacturing, energy, transportation, and utilities. It includes systems such as Industrial Control Systems (ICS), SCADA, PLCs, and DCS. ICS Security is the protection of industrial automation and control systems that manage critical operations like power generation, water treatment, and oil and gas production. Its goal is to safeguard confidentiality, integrity, and availability while... Operational Technology (OT) refers to hardware and software used to monitor, control, and manage industrial processes, infrastruct... |
cena:
88,35 zł |
![]() |
Cybersecurity Threats and Attacks in the Gaming Industry
ISBN: 9798868814914 / Angielski / Miękka / 106 str. Termin realizacji zamówienia: ok. 22 dni roboczych (Bez gwarancji dostawy przed świętami) Learn about the most common and known threats and attacks in the gaming industry. Cybersecurity is a critical concern in the gaming industry due to the significant financial investments, personal data, and intellectual property at stake. Game developers, publishers, and players all have a vested interest in maintaining a secure gaming environment. This pocketbook is about why cybersecurity in the gaming industry is essential to protect player data, maintain a secure gaming environment, and safeguard intellectual property. Both players and game developers need to remain vigilant,... Learn about the most common and known threats and attacks in the gaming industry. Cybersecurity is a critical concern in the gaming industry due to... |
cena:
112,95 zł |
![]() |
Spring Security 6 Recipes: Essential Techniques for Quick and Secure Java Applications
ISBN: 9798868812965 / Angielski / Miękka / 2025 / 80 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych (Bez gwarancji dostawy przed świętami) Ensure robust web security for your Java applications in just a few days. This recipe-driven, practical pocketbook provides a straightforward guide to quickly developing and deploying secure enterprise applications using the Spring 6 Framework, Spring Boot 3, and the H2 database. The book is organized into problems and corresponding recipes, offering solutions for both small and large challenges. First, you will learn how to install all essential development tools, such as IntelliJ IDEA, JDK v17, and Maven. Then you will dive into recipes on using Spring Security 6 with JSP tags and...
Ensure robust web security for your Java applications in just a few days. This recipe-driven, practical pocketbook provides a straightforward guide to...
|
cena:
88,35 zł |
![]() |
Secure RESTful APIs: Simple Solutions for Beginners
ISBN: 9798868812842 / Angielski / Miękka / 2025 / 80 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych (Bez gwarancji dostawy przed świętami) Secure your RESTful APIs with confidence and efficiency. This straightforward guide outlines the essential strategies and best practices for protecting sensitive data when developing RESTful APIs for your applications. Inside, you’ll explore the fundamental functionalities to implement industry-standard authentication authorization mechanisms for Java applications. With chapters covering key security concerns, data protection, and designing and testing secure APIs, this book provides a hands-on approach to protecting user data, validating inputs, and implementing security mechanisms such...
Secure your RESTful APIs with confidence and efficiency. This straightforward guide outlines the essential strategies and best practices for protectin...
|
cena:
88,35 zł |
![]() |
Pro Android Games: L Edition
ISBN: 9781484205884 / Angielski / Miękka / 2015 / 408 str. Termin realizacji zamówienia: ok. 22 dni roboczych (Bez gwarancji dostawy przed świętami) Combining actionable, real-world source code with graphics, Pro Android Games, Third Edition shows you how to build more sophisticated and addictive Android game apps with minimum effort. Harness the power of the latest Android 5.0 SDK to bring countless legendary, action-packed PC games to the Android platform. With actionable real-world source code, this one of a kind book shows you how to build more sophisticated and addictive Android game apps, by leveraging the power of the recent advancements found in the new Android 5.0 software development kit as well as those... Combining actionable, real-world source code with graphics, Pro Android Games, Third Edition shows you how to build more sophisticated and... |
cena:
181,55 zł |