Filter
Nätverkssäkerhet
Filter
Threat modeling is one of the most essential--and most misunderstood--parts of the development lifecycle. Whether you're a security practitioner or a member of a development team, …
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly …
Companies are spending billions on machine learning projects, but its money wasted if the models cant be deployed effectively. In this practical guide, Hannes Hapke and Catherine …
Automate the fundamental structure of your cloud account with reliable coded security and governance in an Amazon Web Services (AWS) environment. This practical guide shows …
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security …
Until recently, learning CoreDNS required reading the code or combing through the skimpy documentation on the website. No longer. With this practical book, developers and operators …
Written by the instructors and creators of the JNTCP-ER Certification Exams, JUNOS Enterprise Routing is the only comprehensive book for Juniper enterprise and edge routing …
What exactly is a cloud-native platform? Its certainly a hot topic in IT, as enterprises today assess this option for developing and delivering software quickly and repeatedly. …
In the last few years, security has become a hot-button issue for IT organizations of all sizes. Accordingly, many of the security features that were either optional or suspect in …
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief …