Home Book reviews Contact

DISCLOSURE: When you click on links to various merchants on this site and make a purchase, this can result in this site earning a commission at no extra cost to you. Affiliate programs and affiliations include, but are not limited to, the eBay Partner Network, Amazon and Alibris.

Please share to

1 titles, showing 1-1 sort by PRICE ASC.
Please follow us on AddALL Facebook page twitter page
TITLE

SORT

change title size:
AUTHOR

SORT

change author size:
PRICE

DEALER / SITE

SORT

DESCRIPTION

 

change description size:
KUMAR CHAWDHURY, TAR
author size:
USD
37.21
price size:
Speedyhen /AbebooksUK
dealer size:
ISBN10: 9355518846, ISBN13: 9789355518842, [publisher: BPB Publications] Softcover
[London, United Kingdom] [Publication Year: 2024]
description size:
Similar titles
Tarun Kumar Chawdhury
author size:
USD
43.28
price size:
PBShop.store UK /AbebooksUK
dealer size:
ISBN10: 9355518846, ISBN13: 9789355518842, [publisher: BPB Publications] Softcover New Book. Shipped from UK. Established seller since 2000.
[Fairford, GLOS, United Kingdom] [Publication Year: 2024]
description size:
Tarun Kumar Chawdhury
author size:
USD
49.59
price size:
Grand Eagle Retail /Abebooks
dealer size:
ISBN10: 9355518846, ISBN13: 9789355518842, [publisher: BPB Publications, New Delhi] Softcover Paperback. This book offers a comprehensive guide to implementing Zero-Trust security principles, cloud-based defenses, and robust application development practices. Through practical examples and expert advice, readers will gain the skills needed to design and develop secure Java applications that easily can tackle today's cyber threats. It builds focus on securing your source code through analysis, vulnerability detection, and automation. It also ensures the safety of your runtime environment for managing traffic and enables multi-factor authentication. While addressing data security concerns with encryption, anonymization, and cloud-based solutions, it also uses tools like OpenTelemetry for real-time threat detection. It manages sensitive information securely with Vault integration and explores passwordless authentication. Reference architectures, secure coding patterns, and automation practices are also provided to aid implementation. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
[Wilmington, DE, U.S.A.] [Publication Year: 2024]
description size:
Tarun Kumar Chawdhury
author size:
USD
49.79
price size:
Books2anywhere via Alibris /Alibris
dealer size:
BPB Publications 4/5/2024 12: 00: 00 AM Softcover PLEASE NOTE, WE DO NOT SHIP TO DENMARK. New Book. Shipped from UK in 4 to 14 days. Established seller since 2000. Please note we cannot offer an expedited shipping service from the UK.
description size:
Tarun Kumar Chawdhury
author size:
USD
52.29
price size:
Paperbackshop International via Alibris /Alibris
dealer size:
BPB Publications 4/5/2024 12: 00: 00 AM Softcover PLEASE NOTE, WE DO NOT SHIP TO DENMARK. New Book. Shipped from UK in 4 to 14 days. Established seller since 2000. Please note we cannot offer an expedited shipping service from the UK.
description size:
Tarun Kumar Chawdhury
author size:
USD
71.26
price size:
AussieBookSeller /AbebooksAU
dealer size:
ISBN10: 9355518846, ISBN13: 9789355518842, [publisher: BPB Publications, New Delhi] Softcover Paperback. This book offers a comprehensive guide to implementing Zero-Trust security principles, cloud-based defenses, and robust application development practices. Through practical examples and expert advice, readers will gain the skills needed to design and develop secure Java applications that easily can tackle today's cyber threats. It builds focus on securing your source code through analysis, vulnerability detection, and automation. It also ensures the safety of your runtime environment for managing traffic and enables multi-factor authentication. While addressing data security concerns with encryption, anonymization, and cloud-based solutions, it also uses tools like OpenTelemetry for real-time threat detection. It manages sensitive information securely with Vault integration and explores passwordless authentication. Reference architectures, secure coding patterns, and automation practices are also provided to aid implementation. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
[Truganina, VIC, Australia] [Publication Year: 2024]
description size:

DISCLOSURE: When you use one of our links to make a purchase, we may earn a commission at no extra cost to you.
As an Amazon Associate, AddALL earn commission from qualifying Amazon purchases.


TOO Many Search Results? Refine it!
Exclude: (what you don't want)
Include: (what you want)
Search Results Sort By:
240515030156455492