Tag

cloud

Capability-Based Security and Macaroons

From API Security in Action by Neil Madden

In this article, you’ll implement capability-based access control techniques that enable secure sharing by taking the principle of least authority (POLA) to its logical conclusion and allowing fine-grained control over access to individual resources. Along the way, you’ll see how capabilities prevent a general category of attacks against APIs known as confused deputy attacks.

AWS Automation with AWS CloudFormation

From AWS CloudFormation in Action by Chuck Gehman

Five Awkward Things about Spring Security that actually Make Sense

From Spring Security in Action by Laurentiu Spilca

This article delves into five awkward things that Spring Security does, which might be giving you trouble in your projects.

Getting a Handle on Edge Computing

From Making Sense of Edge Computing by Cody Bumgardner & Caylin Hickey

Provisioning the Autoscaling Group

From Terraform in Action by Scott Winkler

This article discusses the lifecycle of a terraform resource.

Real-World Devops

From Operations Anti-Patterns: DevOps Solutions by Jeffery D. Smith

What is a Penetration Tester?

From Penetrating Enterprise Networks by Royce Davis

This article describes penetration testing: what it is and why a company might want a penetration test. We will also delve into the job of the penetration tester.

Improving Mad Libs with Expressions

From Terraform in Action by Scott Winkler

This article discusses how we can improve a Mad Libs generator using expressions.

Securing Your Spring Applications

From Spring Security in Action by Laurentiu Spilca

The Guide to Microservices with Spring

From Spring Microservices in Action, Second Edition by John Carnell & Illary Huaylupo Sánchez

© 2020 Manning — Design Credits