Home Book reviews Contact

DISCLOSURE: When you click on links to various merchants on this site and make a purchase, this can result in this site earning a commission at no extra cost to you. Affiliate programs and affiliations include, but are not limited to, the eBay Partner Network, Amazon and Alibris.

Please share to

3 titles, showing 1-3 sort by PRICE ASC.
Please follow us on AddALL Facebook page twitter page
TITLE

SORT

change title size:
AUTHOR

SORT

change author size:
PRICE

DEALER / SITE

SORT

DESCRIPTION

 

change description size:
Kumar Chawdhury, Tar
author size:
USD
48.37
price size:
Kennys Bookshop and Art Galleries Ltd. /Abebooks
dealer size:
ISBN10: 9355518846, ISBN13: 9789355518842, [publisher: BPB Publications] Softcover 2024. paperback. . . . . .
[Galway, GY, Ireland] [Publication Year: 2024]
description size:
Kumar Chawdhury, Tar
author size:
USD
55.46
price size:
Kennys Bookstore /Abebooks
dealer size:
ISBN10: 9355518846, ISBN13: 9789355518842, [publisher: BPB Publications] Softcover 2024. paperback. . . . . . Books ship from the US and Ireland.
[Olney, MD, U.S.A.] [Publication Year: 2024]
description size:
Kumar Chawdhury, Tar
author size:
USD
56.13
price size:
Kennys.ie via Alibris /Alibris
dealer size:
Bpb Publications 2024 Trade paperback New 2024. paperback......We ship daily from our Bookshop.
description size:
Similar titles
Tarun Kumar Chawdhury
author size:
USD
46.89
price size:
AHA-BUCH GmbH /AbebooksDE
dealer size:
ISBN10: 9355518846, ISBN13: 9789355518842, [publisher: BPB Publications] Softcover nach der Bestellung gedruckt Neuware - Printed after ordering - Elevate your Java security skills for the modern cloud era¿DESCRIPTIONThis book offers a comprehensive guide to implementing Zero-Trust security principles, cloud-based defenses, and robust application development practices. Through practical examples and expert advice, readers will gain the skills needed to design and develop secure Java applications that easily can tackle today's cyber threats.It builds focus on securing your source code through analysis, vulnerability detection, and automation. It also ensures the safety of your runtime environment for managing traffic and enables multi-factor authentication. While addressing data security concerns with encryption, anonymization, and cloud-based solutions, it also uses tools like OpenTelemetry for real-time threat detection. It manages sensitive information securely with Vault integration and explores passwordless authentication. Reference architectures, secure coding patterns, and automation practices are also provided to aid implementation.By the end of this book, you'll be well-equipped to build secure Java applications with confidence and deliver applications that are robust, reliable, and compliant.WHAT YOU WILL LEARN¿ Implement Zero-Trust principles in Java applications.¿ Secure Java apps in cloud environments like AWS, GCP, and Azure.¿ Develop ...
description size:

DISCLOSURE: When you use one of our links to make a purchase, we may earn a commission at no extra cost to you.
As an Amazon Associate, AddALL earn commission from qualifying Amazon purchases.


TOO Many Search Results? Refine it!
Exclude: (what you don't want)
Include: (what you want)
Search Results Sort By:
240515030156455492