Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
1,232
result(s) for
"World Wide Web Security measures."
Sort by:
Internet of things for smart cities : technologies, big data and security
This book introduces the concept of smart city as the potential solution to the challenges created by urbanization. The Internet of Things (IoT) offers novel features with minimum human intervention in smart cities. This book describes different components of Internet of Things (IoT) for smart cities including sensor technologies, communication technologies, big data analytics and security.
Security Technologies for the World Wide Web
2002
An overview of all the security technologies that are relevant to the World Wide Web, Web-based applications and Web services. This second edition addresses issues related to http security, firewalls and proxy servers, cryptographic security protocols, electronic payment systems, public key infrastructures and more. It also provides a look at future developments in the field.
OAuth 2 in action
This book teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization server, and a protected resource. Then you'll dig into tokens, dynamic client registration, and more advanced topics
Innocent code
2004
This concise and practical book will show where code vulnerabilities lie and how best to fix them. Its value is in showing where most coding errors lie, without needing to delve into the specifics of each system architecture, programming or scripting language or application and it provides illustrations with real code.
How to Attack and Defend Your Website
2014,2015
How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials.The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to.
Web Security
2015
This book presents a comprehensive guide to web security and explains how companies can build a highly effective and sustainable security system. It reveals how hackers work and explains why companies of different scale require different security methodologies. With in-depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, click jacking, injection attacks, web frame security, leaks, transactions security, and security development lifecycle.
Security intelligence
2015
Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation that is the deployment strategy, then verifies the solution against the original problem by analyzing security incidents and mining hidden breaches, ultimately refines the security formula iteratively in a perpetual cycle. You will learn about: -Secure proxies – the necessary extension of the endpoints -Application identification and control – visualize the threats -Malnets – where is the source of infection and who are the pathogens -Identify the security breach – who was the victim and what was the lure -Security in Mobile computing – SNAFU With this book, you will be able to: -Identify the relevant solutions to secure the infrastructure -Construct policies that provide flexibility to the users so to ensure productivity -Deploy effective defenses against the ever evolving web threats -Implement solutions that are compliant to relevant rules and regulations -Offer insight to developers who are building new security solutions and products
SSL and TLS: Theory and Practice
SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a comprehensive introduction to these protocols, offering you a solid understanding of their design. You find discussions on the advantages and disadvantages of using SSL/TLS protocols compared to other Internet security protocols. This authoritative resource shows how to properly employ SSL and TLS and configure security solutions that are based on the use of the SSL/TLS protocols.