Tag

security

Compromising a Microsoft SQL Server

From The Art of Network Penetration Testing by Royce Davis

Building Secure Python Apps

From Practical Python Security by Dennis Byrne

Canary Deployments

From GitOps and Kubernetes by Billy Yuen, Alexander Matyushentsev, Todd Ekenstam, and Jesse Suen

This article delves into Canary deployments: what they are; how they work; and where you might consider using them.

Becoming a Spring master

From Spring in Action, 6th Edition by Craig Walls

The Basic Building Blocks of SSI

From Self-Sovereign Identity by Drummond Reed & Alex Preukschat

This article delves into the constituent parts of Self-Sovereign Identity (SSI), and how they work together.

Logical Access Protection: Securing the use of your AWS account with IAM

From AWS Security by Dylan Shields

This article deals with methods you can use to secure your AWS account.

Discovering Patching Vulnerabilities

From The Art of Network Penetration Testing by Royce Davis

This article delves into how attackers discover and exploit patching vulnerabilities.

Capability-Based Security and Macaroons

From API Security in Action by Neil Madden

In this article, you’ll implement capability-based access control techniques that enable secure sharing by taking the principle of least authority (POLA) to its logical conclusion and allowing fine-grained control over access to individual resources. Along the way, you’ll see how capabilities prevent a general category of attacks against APIs known as confused deputy attacks.

Five Awkward Things about Spring Security that actually Make Sense

From Spring Security in Action by Laurentiu Spilca

This article delves into five awkward things that Spring Security does, which might be giving you trouble in your projects.

© 2020 Manning — Design Credits