悟空视频

    在线播放云盘网盘BT下载影视图书

    Spring Security - 图书

    2017计算机·理论知识
    导演:Mick Knutson Robert Winch Peter Mularien
    This book is intended for Java Web and/or RESTful webservice developers and assumes a basic understanding of creating Java 8, Java Web and/or RESTful webservice applications, XML, and the Spring Framework. You are not expected to have any previous experience with Spring Security.
    Spring Security
    搜索《Spring Security》
    图书

    Security Analysis - 图书

    导演:Benjamin Graham
    First published in 1934, Security Analysis is one of the most influential financial books ever written. Selling more than one million copies through five editions, it has provided generations of investors with the timeless value investing philosophy and techniques of Benjamin Graham and David L. Dodd. As relevant today as when they first appeared nearly 75 years ago, the teachi...(展开全部)
    Security Analysis
    搜索《Security Analysis》
    图书

    Security with Go - 图书

    2018科学技术·自然科学
    导演:John Daniel Leon
    Security with Go is aimed at developers with basics in Go to the level that they can write their own scripts and small programs without difficulty. Readers should be familiar with security concepts, and familiarity with Python security applications and libraries is an advantage, but not a necessity.
    Security with Go
    搜索《Security with Go》
    图书

    Learn Kubernetes Security - 图书

    2020经济理财·财经
    导演:Kaizhe Huang Pranjal Jumde Loris Degioanni
    Kubernetes is an open source orchestration platform for managing containerized applications. Despite widespread adoption of the technology, DevOps engineers might be unaware of the pitfalls of containerized environments. With this comprehensive book, you'll learn how to use the different security integrations available on the Kubernetes platform to safeguard your deployments in a variety of scenarios.Learn Kubernetes Security starts by taking you through the Kubernetes architecture and the networking model. You'll then learn about the Kubernetes threat model and get to grips with securing clusters. Throughout the book, you'll cover various security aspects such as authentication, authorization, image scanning, and resource monitoring. As you advance, you'll learn about securing cluster components (the kube-apiserver, CoreDNS, and kubelet) and pods (hardening image, security context, and PodSecurityPolicy). With the help of hands-on examples, you'll also learn how to use open source tools such as Anchore, Prometheus, OPA, and Falco to protect your deployments.By the end of this Kubernetes book, you'll have gained a solid understanding of container security and be able to protect your clusters from cyberattacks and mitigate cybersecurity threats.
    Learn Kubernetes Security
    搜索《Learn Kubernetes Security》
    图书

    Information Security Handbook - 图书

    2017科学技术·工业技术
    导演:Darren Death
    This book is for security analysts and professionals who deal with security mechanisms in an organization. If you are looking for an end to end guide on information security and risk analysis with no prior knowledge of this domain, then this book is for you.
    Information Security Handbook
    搜索《Information Security Handbook》
    图书

    Untangle Network Security - 图书

    2014科学技术·工业技术
    导演:Abd El Monem A. El Bawab
    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.
    Untangle Network Security
    搜索《Untangle Network Security》
    图书

    Mastering AWS Security - 图书

    2017计算机·编程设计
    导演:Albert Anthony
    This book is for all IT professionals, system administrators and security analysts, solution architects and Chief Information Security Officers who are responsible for securing workloads in AWS for their organizations. It is helpful for all Solutions Architects who want to design and implement secure architecture on AWS by the following security by design principle. This book is helpful for personnel in Auditors and Project Management role to understand how they can audit AWS workloads and how they can manage security in AWS respectively.If you are learning AWS or championing AWS adoption in your organization, you should read this book to build security in all your workloads. You will benefit from knowing about security footprint of all major AWS services for multiple domains, use cases, and scenarios.
    Mastering AWS Security
    搜索《Mastering AWS Security》
    图书

    Android Security Cookbook - 图书

    2013计算机·理论知识
    导演:Keith Makan Scott Alexander Bown
    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs. Android Security Cookbook is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from reading this book.
    Android Security Cookbook
    搜索《Android Security Cookbook》
    图书

    Android Security Cookbook - 图书

    2013计算机·理论知识
    导演:Keith Makan Scott Alexander Bown
    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs. Android Security Cookbook is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from reading this book.
    Android Security Cookbook
    搜索《Android Security Cookbook》
    图书

    Information Security Handbook - 图书

    2017科学技术·工业技术
    导演:Darren Death
    This book is for security analysts and professionals who deal with security mechanisms in an organization. If you are looking for an end to end guide on information security and risk analysis with no prior knowledge of this domain, then this book is for you.
    Information Security Handbook
    搜索《Information Security Handbook》
    图书
    加载中...