Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
1,232 result(s) for "World Wide Web Security measures."
Sort by:
Internet of things for smart cities : technologies, big data and security
This book introduces the concept of smart city as the potential solution to the challenges created by urbanization. The Internet of Things (IoT) offers novel features with minimum human intervention in smart cities. This book describes different components of Internet of Things (IoT) for smart cities including sensor technologies, communication technologies, big data analytics and security.
Security Technologies for the World Wide Web
An overview of all the security technologies that are relevant to the World Wide Web, Web-based applications and Web services. This second edition addresses issues related to http security, firewalls and proxy servers, cryptographic security protocols, electronic payment systems, public key infrastructures and more. It also provides a look at future developments in the field.
OAuth 2 in action
This book teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization server, and a protected resource. Then you'll dig into tokens, dynamic client registration, and more advanced topics
Innocent code
This concise and practical book will show where code vulnerabilities lie and how best to fix them. Its value is in showing where most coding errors lie, without needing to delve into the specifics of each system architecture, programming or scripting language or application and it provides illustrations with real code.
How to Attack and Defend Your Website
How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials.The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to.
Web Security
This book presents a comprehensive guide to web security and explains how companies can build a highly effective and sustainable security system. It reveals how hackers work and explains why companies of different scale require different security methodologies. With in-depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, click jacking, injection attacks, web frame security, leaks, transactions security, and security development lifecycle.
Security intelligence
Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation that is the deployment strategy, then verifies the solution against the original problem by analyzing security incidents and mining hidden breaches, ultimately refines the security formula iteratively in a perpetual cycle. You will learn about: -Secure proxies – the necessary extension of the endpoints -Application identification and control – visualize the threats -Malnets – where is the source of infection and who are the pathogens -Identify the security breach – who was the victim and what was the lure -Security in Mobile computing – SNAFU With this book, you will be able to: -Identify the relevant solutions to secure the infrastructure -Construct policies that provide flexibility to the users so to ensure productivity -Deploy effective defenses against the ever evolving web threats -Implement solutions that are compliant to relevant rules and regulations -Offer insight to developers who are building new security solutions and products
SSL and TLS: Theory and Practice
SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a comprehensive introduction to these protocols, offering you a solid understanding of their design. You find discussions on the advantages and disadvantages of using SSL/TLS protocols compared to other Internet security protocols. This authoritative resource shows how to properly employ SSL and TLS and configure security solutions that are based on the use of the SSL/TLS protocols.