Old Search System: secure




  • Business partners with a secure blockchain - 492162

    Business partners with a secure blockchain - 492162 PSD | 4699 x 5000 px |...





  • Business partners with a secure blockchain - 492653

    Business partners with a secure blockchain - 492653 PSD | 4623 x 5000 px |...





  • Programmers with a secure blockchain - 492591

    Programmers with a secure blockchain - 492591 PSD | 5000 x 4695 px | 300...





  • Business people with a secure blockchain - 492538

    Business people with a secure blockchain - 492538 PSD | 5000 x 4332 px |...





  • Business partners with a secure blockchain - 492501

    Business partners with a secure blockchain - 492501 PSD | 4623 x 5000 px |...





  • Business people with a secure blockchain - 492226

    Business people with a secure blockchain - 492226 PSD | 5000 x 4009 px |...





  • Business people with a secure blockchain - 492212

    Business people with a secure blockchain - 492212 PSD | 5000 x 4695 px |...





  • Young businesswoman holding a secured laptop - 493176

    Young businesswoman holding a secured laptop - 493176 PSD | 5000 x 4081 px |...





  • Business partners with a secure blockchain - 493150

    Business partners with a secure blockchain - 493150 PSD | 4699 x 5000 px |...





  • Programmers with a secure blockchain - 492972

    Programmers with a secure blockchain - 492972 PSD | 5000 x 4695 px | 300...





  • LEE\'s Web Hacking (SQL-injection AND SECURE-CODING Skills)

    LEE's Web Hacking (SQL-injection AND SECURE-CODING Skills)Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000...


    What you\'ll learn
    How to defend the extremly critical attack skills from the SQLmap (KALI-Linux\'s or Win32\'s cracking tool)
    Requirements
    Web programming Skills [ especially on HTTP / SQL / PHP / HTML / MYSQL / MariaDB / XAMPP ]
    Description
    This course is very compact, simple but has very valuable interesting content.
    Designed...


  • Young businesswoman holding a secured laptop - 492803

    Young businesswoman holding a secured laptop - 492803 PSD | 5000 x 4081 px |...





  • Programmers with a secure blockchain - 492779

    Programmers with a secure blockchain - 492779 PSD | 5000 x 4695 px | 300...





  • Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems

    Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems by Heather...


    Two previous O\'Reilly books from Google—Site Reliability Engineering and The Site Reliability Workbook—demonstrated how and why a commitment to the entire service lifecycle enables organizations to successfully build, deploy, monitor, and maintain software systems. In this latest guide, the authors offer insights into system design, implementation, and maintenance from practitioners...


  • How to Create a Secure Website With WordPress

    How to Create a Secure Website With WordPressVideo: .mp4 (1280x720, 30 fps(r)) | Audio: aac,...


    What you\'ll learn
    Learn to Create a Responsive Website in Less Than 1 Hour.
    Learn step by step how to customize the Virtue Theme.
    Setup secure WordPress login using questions.
    Backup and Restore your Website after an Attack.
    Learn to Protect WordPress from Brute Force Attacks.
    Learn to Secure an...


  • Lynda - Programming Foundations: Secure Coding

    Lynda - Programming Foundations: Secure Coding Learn how to incorporate security into the software development...


    Table of ContentsIntroduction1. Security and Risk Overview2. Web Client Server Interaction Code Issues3. Thick App and Client-Server Interaction Issues4. Crypto and Security Misuse Issues5. Security in the SDLCConclusion


  • Lynda - Microsoft Azure: Secure Resources

    Lynda - Microsoft Azure: Secure Resources Protect your Azure deployments. Learn to secure Azure resources...


    Table of ContentsIntroduction1. Secure Resources Using Managed Identities2. Secure Resources Using Hybrid Identities3. Secure Resources Using Identity Providers4. Identify an Appropriate Data Security Solution5. Design a Role-Based Access Control Strategy6. Manage Security Risks Using an Appropriate Security SolutionConclusion


  • SkillShare - PHP Projects: How to Create a Secure, Session-Based Login Script

    SkillShare - PHP Projects: How to Create a Secure, Session-Based Login Script Intermediate level https://www.skillshare.com/classes/PHP-Projects-How-to-Create-a-Secure-Session-Based-Login-Script/541658337


    About This Class You'll learn how to create a secure, session-based login system in PHP. There's two versions: 1) a simple non-database version we'll create first to quickly over all the base concepts. Then 2) we'll convert that into full-fledged database-driven login script complete with: Secure, session-based user access User...


  • Lynda - Programming Foundations: Secure Coding

    Programming Foundations: Secure Coding https://www.lynda.com/Web-Development-tutorials/Programming-Foundations-Secure-Coding/724800-2.html Learn how to incorporate security into the software development life...


    Introduction 1. Security and Risk Overview 2. Web Client Server Interaction Code Issues 3. Thick App and Client-Server Interaction Issues 4. Crypto and Security Misuse Issues 5. Security in the SDLC Conclusion


  • Lynda - PHP: Creating Secure Websites

    Lynda - PHP: Creating Secure Websites Hackers target PHP web applications more often than other...


    Table of ContentsIntroduction1. Security Overview2. Securing Your PHP Installation3. Filtering Input and Controlling Output4. Defending against the Most Common Attacks5. Encryption and User AuthenticationConclusion

Showing 180-200