Old Search System: secure




  • Secure Software Design Secure Software Series Course 3 of 8

    Published 1/2023Created by Joseph Holbrook (The Cloud Tech Guy)MP4 | Video: h264, 1280x720 | Audio:...


    Detee how to specify the proper software architecture to meet your software security requirements Identify the correct software build requirements needed for a secure software program What are the critical aspects of secure development Anyone preparing for the (ISC)² Certified Secure Software Lifecycle Professional (CSSLP) exam would benefit as well...


  • GiliSoft Secure Disc Creator 8.3

    GiliSoft Secure Disc Creator 8.3 | 6.4 Mb With GiliSoft Secure Disc Creator, your can...


    Here are some key features of \"GiliSoft Secure Disc Creator\":
    Password Protection:
    · GiliSoft Secure Disc Creator is a powerful tool to burn password protected cd dvd.
    Complete Security of your data:
    · Whatever information, files, folders and documents you put in your cd dvd drive, GiliSoft Secure Disc Creator keeps them completely secured.
    Peace...


  • Secure Software Development Concepts - Series Course 1 Of 8

    Published 1/2023MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 425.45...


    Understand the critical aspects of secure software development. What you'll learn What are the critical aspects of secure development What is the CIA Triad, AAA and other security fundamentals Identify the correct software build requirements needed for a secure software program Detee how to specify the proper software architecture to...


  • Vector collection of ssl protection secure icon vector illustration vol 2

    Vector collection of ssl protection secure icon vector illustration vol 2Format EPS





  • Vector collection of ssl protection secure icon vector illustration isolated on white background vol 2

    Vector collection of ssl protection secure icon vector illustration isolated on white background vol 2Format...





  • Learning Path Spring Secure Your Apps With Spring Security

    Last updated 2/2020MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size:...


    Learn Spring Security architecture and design to secure your Java applications What you'll learn Understand the Spring Framework architecture and its components Explore the spring MVC application using java configuration Learn to implement Spring Security in the sample application Get familiar with filter chains and core security filters Understand what...


  • Learning Path Aws Building Secured Applications With Aws

    Last updated 9/2017MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size:...


    Leverage various AWS components and services to build highly scalable and reliable cloud environments What you'll learn Add fully-managed user information and privilege services on your virtual network Manage traffic with 's Elastic Load Balancer Create EC2 instances Balance your simple API Build fine-grained network access controls Discover the important...


  • Industrial IoT for Architects and Engineers Architecting secure, robust, and scalable industrial IoT solutions with AWS

    English | 2023 | ISBN: ‎ 180324089X | 344 pages | True PDF | 25.13...


    Go beyond connecting services to understand the unique challenges encountered in industrial environments by building Industrial IoT architectures using AWS Purchase of the print or kindle book includes a free eBook in the PDF format Key Features Book Description When it comes to using the core and managed services available...


  • Secure Wireless Sensor Networks Threats and Solutions (True)

    English | PDF.EPUB | 2016 | 180 Pages | ISBN : 1493934589 | 5.12 MB


    This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions for the node capture attack and the clone attack....


  • Secure Smart Embedded Devices, Platforms and Applications (True)

    English | PDF,EPUB | 2014 | 599 Pages | ISBN : 1461479142 | 16.39 MB


    New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices,...


  • Accelerating DevSecOps on AWS Create secure CICD pipelines using Chaos and AIOps

    English | 2022 | ISBN: ‎ 1803248602 | 520 pages | True PDF EPUB |...


    Build high-performance D pipelines that are powered by AWS and the most cutting-edge tools and techniques Key Features Master the full AWS developer toolchain for building high-performance, resilient, and powerful D pipelines Get to grips with Chaos eeering, DevSecOps, and AIOps as applied to D Employ the latest tools and...


  • Coursera - Secure Coding Practices Specialization

    Last updated 12/2022MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 ChGenre: eLearning...


    Practice improving the security and robustness of your programs. Create threat models and apply basic cryptography. Evaluate and remediate fragile C library code. Exploit common types of injection problems and fix the root causes. Cybersecurity Java secure programming C/C Cryptography Authentication Methods Identifying vulernabilities C/C Programming Java Programming security 3,107...


  • Creating Secure User Authentication System In Codeigniter

    Last updated 6/2018MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size:...


    Complete User Authentication System in Coditer - User Login, Registration, Reset Password What you'll learn Develop a User Management Application in Coditer Learn Coditer with Hands On Experience Easy to understood by begginers Requirements Basic Knowledge of Coditer Description Welcome to the course Creating User Authentication System in Coditer =>...


  • Videohive - SECURE Stamp - 42510018

    https://s3.envato.com/0dbd495a-4d9a-489b-a16e-b97dd2302458/watermarked_preview/watermarked_preview.mp4 Videohive - SECURE Stamp - 42510018 https://videohive.net/item/secure-stamp/42510018





  • Terraform for Google Cloud Essential Guide Learn how to provision infrastructure in Google Cloud securely and efficiently

    English | 2023 | ISBN: ‎ 1804619620 | 180 pages | True PDF | 6.59...


    Become an expert in Terraform on Google Cloud by using Infrastructure as Code for provisioning multiple yet consistent environments to increase productivity in no Key Features Book Description Google Cloud has adopted Terraform as the standard Infrastructure as Code tool. This necessitates a solid understanding of Terraform for any cloud...


  • SAFe for DevOps Practitioners Implementing robust, secure and scaled agile solutions with the continuous delivery pipelines

    English | 2023 | ISBN: ‎ 1803231424 | 330 pages | True PDF EPUB |...


    A step-by-step guide with real-world use cases depicting how the DevOps approach with Scaled Agile Framework helps you to develop and deliver high-quality and secured solutions with reduced risk of production failures Key Features Explore the five elements of the CALMR approach with examples to avoid the product development challenges...


  • Using Openbsd As A Secure And Reliable Network Firewall

    Published 12/2022MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 267.77...


    As well as a basic understanding of UNIX OS CLI/shell would help. A strong desire and deteation to learn! Hello my name is Tyler Monroe and In this course I will teach you how to take a new or used computer and or VM Hypervisor and turn it into a...


  • How To Secure Your Linkedin Account From Hackers

    Published 12/2022 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz Language: English |...


    Ultimate Guide to Linkedin Privacy for you and your business What you'll learn You will learn how to keep your Linkedin personal or business account Safe and Secure You will learn how to prevent your data being stolen while using Linkedin. You will learn how to prevent your competitors from...


  • Designing a Secure Web3

    Designing a Secure Web3 https://www.linkedin.com/learning/designing-a-secure-web3 Web3 seems to be on everyone's minds these days. The...


    In this course, author and technologist Ian Khan shows you the essentials of designing and managing Web3 so it's completely secure and accessible to all.Discover the core concerns of security professionals when it comes to building out Web3, including decentralization, democratization of services, encryption, privacy, and the semantic web. Equip...


  • Windows Server Hybrid Administrator Associate (AZ-801) Cert Prep: 1 Secure Windows Server On-Premises and Hybrid Infrastructure

    Windows Server Hybrid Administrator Associate (AZ-801) Cert Prep: 1 Secure Windows Server On-Premises and Hybrid...


    Becoming a certified Windows Server Hybrid Administrator Associate can elevate your career, help you land a new role, and develop your skill set for managing infrastructure. In this course, instructor Robert McMillen takes you through the first domain of the Microsoft AZ-801 exam, which tests your ability to configure and...

Showing 80-100