Old Search System: secure




  • Lynda - Windows 10: Configure, Secure, and Manage Data

    Lynda - Windows 10: Configure, Secure, and Manage Data Windows 10 is the latest release...


    Table of ContentsIntroduction1. Configuring Data Storage2. Securing Data3. Encrypting Data4. Managing Data Access5. Sharing FilesConclusion


  • Lynda - Securing the IoT: Secure Architectures

    Lynda - Securing the IoT: Secure Architectures IoT is one of the biggest new developments...


    Table of ContentsIntroduction1. Enterprise Architecture2. Designing IoT Security3. Domain Specific Architectures4. Proximity Network Services5. Application Tier Services6. Revised Conceptual ArchitectureConclusion


  • Lynda - WordPress: Developing Secure Sites

    Lynda - WordPress: Developing Secure Sites Leaving your WordPress site unsecured leaves you, your users,...


    Table of ContentsIntroduction1. Getting Started2. Security Essentials3. Hardening WordPress4. Improving Security with Plugins5. Advanced Tips and Tricks6. Applying Best PracticesConclusion


  • Lynda - CSSLP Cert Prep: 1 Secure Software Concepts

    CSSLP Cert Prep: 1 Secure Software Concepts English | 1h 34m | Video 720p |...


    Topics include: The core principles of confidentiality and availability The basics of accountability, including auditing and logging Least privilege Fail safes, including exception handling Leveraging existing components Eliminating single points of failure Homepage:


  • Engineering Applications of FPGAs: Chaotic Systems, Artificial Neural Networks, Random Number Generators, and Secure Communication Systems

    Engineering Applications of FPGAs: Chaotic Systems, Artificial Neural Networks, Random Number Generators, and Secure Communication...




  • Secure Tax

    Coktum

    Secure Tax

    Secure Tax https://www.uplabs.com/posts/secure-tax





  • Secure Space and Private Locker Illustration

    Secure Space and Private Locker Illustration https://www.uplabs.com/posts/secure-space-and-private-locker-illustration





  • Secure Space and Private Locker Illustration

    Secure Space and Private Locker Illustration https://www.uplabs.com/posts/secure-space-and-private-locker-illustration-a6ddce45-6ee9-44a2-9416-d332d57c33a7





  • Secure Space and Private Locker Illustration

    Secure Space and Private Locker Illustration https://www.uplabs.com/posts/secure-space-and-private-locker-illustration-8eed6bb7-1394-4708-ae3c-327164923804





  • Secure Helpdesk Illustrations CRM

    Secure Helpdesk Illustrations CRM https://www.uplabs.com/posts/secure-helpdesk-illustrations-crm





  • Secure Docs Gradient Icon

    Secure Docs Gradient Icon https://www.uplabs.com/posts/secure-docs-gradient-icon





  • Secure Company Logo

    Secure Company Logo https://www.uplabs.com/posts/secure-company-logo




  • secure app

    Coktum

    secure app

    secure app https://www.uplabs.com/posts/secure-app





  • Secure Coding: OWASP Top 10 Best Practices!

    Secure Coding: OWASP Top 10 Best Practices!Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100...


    What you\'ll learn
    Secure Coding methodoligies
    Protection methods against common OWASP Top 10 vulnerabilities within the code
    Seeing the consequences of insecure coding from hackers\' point of view
    Automizing everything: Ways to work in a proper DevSecOps fashion for your SDLC (a.k.a Secure SDLC)
    Valuable tips on integrating a SAST...


  • Oreilly - Secure Coding Rules for Java, Part I

    Oreilly - Secure Coding Rules for Java, Part I by Robert Seacord | Publisher: Addison-Wesley...


    6+ Hours of Video InstructionOverviewJava Professional Development LiveLessons provides developers with practical guidance for developing Java programs that are robust and secure. These LiveLessons complement The CERT Oracle Secure Coding Standard for Java.DescriptionIn this video training, Robert provides complementary coverage to the rules in The CERT Oracle Secure Coding Standard...


  • Oreilly - Professional C Programming LiveLessons (Video Training), Part I: Writing Robust, Secure, and Reliable Code

    Oreilly - Professional C Programming LiveLessons (Video Training), Part I: Writing Robust, Secure, and Reliable...


    Professional C Programming LiveLessons, Part I: Writing Robust, Secure, and Reliable Codeby Robert C. Seacord provides an in depth explanation of how to use common C language features to produce robust, secure, and reliable code. The video is designed for developers who have completed an introductory course in C language...


  • Udemy - How To Secure Your WordPress Site & Protect Files Safely

    Udemy - How To Secure Your WordPress Site & Protect Files Safely https://www.udemy.com/course/how-to-secure-your-wordpress-site-protect-files-safely/ Dear Business...


    Description Dear Business Owners,In a recent study done by Sucuri, around 90% of all the hacked content management systems that they investigated and helped fix in 2018 were WordPress sites.If you rely on your website for your business - whether that means for marketing purposes, business operations, or anything important...


  • Oreilly - Introduction to Secure Software

    Oreilly - Introduction to Secure Software by Brian Sletten | Publisher: O'Reilly Media, Inc. |...


    It's an unfortunate truism that many good developers are bad at software security. They cling to the belief that security is something you can just buy and bolt on, but that's not the case. It's not that developers want to be bad at security, they just don't know where to...


  • Illustration Secured Credit Card

    Illustration Secured Credit Card https://www.uplabs.com/posts/illustration-secured-credit-card





  • Oreilly - Certified Secure Web Application Engineer (CSWAE)

    Oreilly - Certified Secure Web Application Engineer (CSWAE) by Integrity Training | Publisher: Stone River...


    The Certified Secure Web Application Engineer (CSWAE) preparatory course is a comprehensive course covering all of the exam topics of the CSWAE certification offered by Mile2. The course helps the students to understand the technologies that are being used under the hood so that they are able to make informed...

Showing 200-220