Tag

security

Being a Better PHP Dev: learning to avoid the common mistakes

This book will upgrade your PHP code by highlighting the errors, antipatterns, and security weaknesses common to PHP applications.

Learn about Cryptography by Learning how to Break It

Implementing and Exploiting Cryptography details dozens of practical cryptographic implementations and then breaks down the flaws that adversaries use to exploit them.

Living on the Edge

Welcome to edge computing. This article covers the introduction to the edge. Read on to find out what edge computing is (and isn’t), how it’s different from the cloud, and where and how it’s used.

Proactive Security: leveraging Azure Security Services

This excerpt covers cybersecurity as an infinite game, the shared responsibility model, Azure security services, the threat landscape, cloud security challenges, the Zero Trust security model, and the defense in depth concept.

Policies and Procedures for Secure Access

From AWS Security by Dylan Shields

This article deals with securing access to your AWS account.

Managing AI and ML Projects: a primer for success

An excerpt from Managing Machine Learning Projects by Simon Thompson

Managing Machine Learning Projects will teach you to guide machine learning projects from design to production—no machine learning experience required!

Read this article if you’re a project manager who works with machine learning applications.

What is Cryptography?

An excerpt from Secret Key Cryptography by Frank Rubin

This article covers:

•       Basic terms used in cryptography

•       What is an unbreakable cipher?

•       What are the different types of cryptography?

Read it if you’re interested in cryptography.

Putting the Sec in DevSecOps

From the Application Security Program Handbook by Derek Fisher

This article discusses where security fits into the DevOps process along with some common approaches.

Read it if you want to learn more about baking security into DevOps.

The Cryptographer’s Toolbox

From Secret Key Cryptography by Frank Rubin

This article covers:

·  The rating system used for ciphers

·  Substitution ciphers

·  Transposition ciphers

·  Fractionation, breaking letters into smaller units

·  Pseudorandom number generators

© 2023 Manning — Design Credits