0 - 500
0
500

Programming Windows Security

Programming Windows Security

A guide to computer security for software developers demonstrates techniques for writing secure applications, covering cryptography, authentication, access control, and credentials.

Pro Power BI Architecture: Sharing, Security, and Deployment Options for Microsoft Power BI Solutions

Pro Power BI Architecture: Sharing, Security, and Deployment Options for Microsoft Power BI Solutions

Architect and deploy a Power BI solution. This book will help you understand the many available options and choose the best combination for hosting, developing, sharing, and deploying a Power BI solution within your organization.Pro Power BI Architecture provides detailed examples and explains the different methods available for sharing and securing Power BI content so…

DNS Security: Defending the Domain Name System

DNS Security: Defending the Domain Name System

DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as DNS is an integral part of the Internet that is involved in…

Mastering Linux – Security

Mastering Linux – Security

The Mastering Linux Series consisting of 6 books (Fundamentals, System Administration, Servers, Storage, Security, Networking) provides you with a solid foundation about the Linux Operating System. It abstracts from a particular distribution by giving you the background knowledge to easily work with any Linux distribution out there.Mastering Linux Security

Practical Linux Security Cookbook

Practical Linux Security Cookbook

Key FeaturesThis book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a networkEnhance file system security and local and remote user authentication by using various security tools and different versions of Linux…

Linux Security Cookbook

Linux Security Cookbook

Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you’re grounded in the basics of security, however, you won’t necessarily want a complete treatise on the subject each time…

Beginners’ Guide to SAP Security and Authorizations

Beginners’ Guide to SAP Security and Authorizations

SAP has a wide range of built-in functionality to meet various security requirements, including network protection, data protection, and SAP authorizations. This book will focus on the application of SAP authorizations and how user access can be limited by transaction codes, organizational levels, field values, etc. Explore the basic architecture of SAP Security and Authorizations…