Honeypots and Routers: Collecting Internet Attacks
As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...
Learning Docker - Second Edition: Build, ship, and scale faster
Docker lets you create, deploy, and manage your applications anywhere at anytime – flexibility is key so you can deploy stable, secure, and scalable app containers across a wide variety of platforms and delve into microservices architecture
About This Book
This up-to-date edition...
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that...
Native Docker Clustering with Swarm
Get to grips with Docker Swarm, one of the key components of the Docker ecosystem.
Optimize Swarm and SwarmKit features for scaling massive applications through containers.
Learn about Docker’s scheduling tricks, high availability, security, and platform scalability.
Securing the Internet of Things
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues...
Getting Started with Kubernetes - Second Edition
Learn how to schedule and run application containers using Kubernetes.
About This Book
Get well-versed with the fundamentals of Kubernetes and get it production-ready for deployments
Confidently manage your container clusters and networks using Kubernetes
Securing PHP Apps
Secure your PHP-based web applications with this compact handbook. You'll get clear, practical and actionable details on how to secure various parts of your PHP web application. You'll also find scenarios to handle and improve existing legacy issues.
Is your PHP app truly secure? Let's make sure you get home...
|Result Page: 39 38 37 36 35 34 33 32 31 30 |