Secure Coding – Secure application development
Methodologies and tools to develop secure applications
Methodologies and tools to develop secure applications
Serverless computing is gaining momentum among developers. Mid-level software engineers are building applications that deliver at the scale and business...
There are a number of techniques for controlling access to web APIs in a microservice architecture, including network controls, crypto‐...
Microservices Security in Action teaches you how to address microservices-specific security challenges throughout the system. This practical guide includes plentiful...
This book will teach you to adopt security automation techniques to continuously improve your entire software development and security testing....
This book is for all IT professionals, system administrators and security analysts, solution architects and Chief Information Security Officers who...
This book shows that present cloud computing is inherently insecure therefore advanced execution models have to be developed to prevent...
Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder help you apply Azure Security Center’s robust protection,...
The GIAC Web Application Defender certification allows candidates to demonstrate mastery of the security knowledge and skills needed to deal...
The GCSA certification covers cloud services and modern DevSecOps practices that are used to build and deploy systems and applications...
Security through data
© 2023 | CyberMaterial | All rights reserved.
World’s #1 Cybersecurity Repository
© 2022 Cybermaterial - Security Through Data .