Threat modeling is one of the most essential--and most misunderstood--parts of the development lifecycle. Whether you're a security practitioner or a member of a development team, …
Traditional secret-based credentials can't scale to meet the complexity and size of cloud and on-premises infrastructure. Today's applications are spread across a diverse range of …
By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and …
Companies are spending billions on machine learning projects, but its money wasted if the models cant be deployed effectively. In this practical guide, Hannes Hapke and Catherine …
Automate the fundamental structure of your cloud account with reliable coded security and governance in an Amazon Web Services (AWS) environment. This practical guide shows …
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional …
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security …
Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use …
Written by the instructors and creators of the JNTCP-ER Certification Exams, JUNOS Enterprise Routing is the only comprehensive book for Juniper enterprise and edge routing …
What exactly is a cloud-native platform? Its certainly a hot topic in IT, as enterprises today assess this option for developing and delivering software quickly and repeatedly. …