Old Search System: secure



  • A Secure Base

    Coktum

    A Secure Base

    A Secure Base 225 pages | English | ISBN-10: 0465075975 | ISBN-13: 978-0465075973 https://www.amazon.com/dp/0465075975





  • Composition of Secure Multi-Party Protocols: A Comprehensive Study (Lecture Notes in Computer Science (2815))

    Composition of Secure Multi-Party Protocols: A Comprehensive Study (Lecture Notes in Computer Science (2815)) 216...





  • How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN

    How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN 416 pages | English |...





  • Networking with Microsoft Windows Vista: Your Guide to Easy and Secure Windows Vista Networking

    Networking with Microsoft Windows Vista: Your Guide to Easy and Secure Windows Vista Networking 552...





  • Engineering Secure Software and Systems: First International Symposium, ESSoS 2009 Leuven, Belgium, February 4-6, 2009, Proceedings (Lecture Notes in Computer Science (5429))

    Engineering Secure Software and Systems: First International Symposium, ESSoS 2009 Leuven, Belgium, February 4-6, 2009,...





  • Wireshark 2 Quick Start Guide: Secure your network through protocol analysis

    Wireshark 2 Quick Start Guide: Secure your network through protocol analysis 164 pages | English...





  • Oreilly - Secure Because Math? Challenges on Applying Machine Learning to Security

    Oreilly - Secure Because Math? Challenges on Applying Machine Learning to Security by | Released...


    Large-scale machine learning, be it supervised or unsupervised, has become an important cornerstone of the information systems we use today. It is only natural that it would become a hot topic in Information Security as well, and a large number of security startups have appeared claiming miracles due to their...


  • Secure Business - Bifold Brochure

    Secure Business - Bifold BrochureINDD | 2 Pages






  • SSL Certificate 2020: HTTP to HTTPS, Padlock & secured connection

    SSL Certificate 2020: HTTP to HTTPS, Padlock & secured connection https://www.skillshare.com/classes/SSL-Certificate-2020-HTTP-to-HTTPS-Padlock-secured-connection/1774269042 Let's Encrypt SSL,...


    This video is for those who wants a short and to the point instructions to install FREE SSL certificates on your website. If you have one or many websites, and/or work as a Freelancer or a web developer this videos will help you to install the SSL certificate removing the...


  • Fundamental Practices for Secure Software Development

    Fundamental Practices for Secure Software Development Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000...



    What you\'ll learn
    Learn about secure software development.
    How to put a system in place to test your software for any overlooked vulnerabilities.
    Learn about secure coding practices.
    Learn about the different kinds of security threats.
    Requirements
    Knowledge of cybersecurity and software engineering
    Description
    Reports about serious vulnerabilities in critical IT components have...


  • Security for Web Developers - Build Secure Web Applications

    Security for Web Developers - Build Secure Web Applications Video: .mp4 (1280x720, 30 fps(r)) |...


    What you\'ll learn
    Different possible injections, and how to prevent them
    About other types of attacks, and how to protect against them
    Some good and bad security practices in various web technologies
    Other security related notes
    Requirements
    knowledge of web development principles
    You don\'t have to apply the code, as it\'s...


  • Advanced ASP.NET Core 3 Security: Understanding Hacks, Attacks, and Vulnerabilities to Secure Your Website

    Advanced ASP.NET Core 3 Security: Understanding Hacks, Attacks, and Vulnerabilities to Secure Your Website by...


    For straightforward use cases, the ASP.NET Core framework does a good job in preventing certain types of attacks from happening. But for some types of attacks, or situations that are not straightforward, there is very little guidance available on how to safely implement solutions. And worse, there is a lot...


  • Secure Coding - Secure application development

    Secure Coding - Secure application development Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000...



    What you\'ll learn
    Secure programming of application code
    Main vulnerabilities inherent in applications
    Secure coding
    Owasp methodologies and standards
    Understand how to mitigate and not introduce vulnerabilities in applications
    Web Application Security
    Requirements
    Knowledge of programming languages
    Description
    The course is suitable for programmers, project managers or software architects and provides indications on...


  • Udemy - A complete & dynamic PHP CMS & a secure Login & Reg system

    Udemy - A complete & dynamic PHP CMS & a secure Login & Reg system...


    Description A complete and dynamic PHP content management system. Develop a secure login and registration system with new user verification, 2-steps authentication, authentication guard, remember me, password reset, add more security layers with CSRF Protection, SQL injection protection, Cross site scripting protection etc. Dynamic Frontend and Backend. Update and create...


  • CodeCanyon - uCloud v2.0.1 - File Hosting Script - Securely Manage, Preview & Share Your Files - 14341108

    CodeCanyon - uCloud v2.0.1 - File Hosting Script - Securely Manage, Preview & Share Your...






  • Lynda - Secure Coding in Python

    Secure Coding in Python https://www.lynda.com/Python-tutorials/Secure-Coding-Python/2825700-2.html Learn how to develop more secure Python applications. In this...


    Introduction 1. Setting Up 2. Avoiding Python Pitfalls 3. Securing Django 4. Securing a RESTful API 5. Securing Flask Conclusion


  • Implementing a Hybrid and Secure Microsoft Exchange Online

    Implementing a Hybrid and Secure Microsoft Exchange Online Video: .mp4 (1280x720, 30 fps(r)) | Audio:...



    What you'll learn
    Plan and Deploy Exchange Hybrid Solution
    Manage hybrid messaging solutions
    Configure mail flow between Microsoft 365 servers and on-premise Exchange servers
    Implement migration
    Troubleshoot failed mailbox migrations
    Configure data loss prevention policies in an Exchange hybrid environment
    Manage address book policies
    Provides demonstrations using several different messaging...


  • Family living in a secure home - 490780

    Family living in a secure home - 490780 PSD | 4527 x 4794 px |...





  • Family living in a secure home - 490777

    Family living in a secure home - 490777 PSD | 4500 x 4151 px |...





  • Young businesswoman holding a secured laptop - 492197

    Young businesswoman holding a secured laptop - 492197 PSD | 5000 x 4081 px |...




Showing 160-180