This book will upgrade your PHP code by highlighting the errors, antipatterns, and security weaknesses common to PHP applications.
Implementing and Exploiting Cryptography details dozens of practical cryptographic implementations and then breaks down the flaws that adversaries use to exploit them.
Welcome to edge computing. This article covers the introduction to the edge. Read on to find out what edge computing is (and isn’t), how it’s different from the cloud, and where and how it’s used.
This excerpt covers cybersecurity as an infinite game, the shared responsibility model, Azure security services, the threat landscape, cloud security challenges, the Zero Trust security model, and the defense in depth concept.
From AWS Security by Dylan Shields
This article deals with securing access to your AWS account.
An excerpt from Managing Machine Learning Projects by Simon Thompson
Managing Machine Learning Projects will teach you to guide machine learning projects from design to production—no machine learning experience required!
Read this article if you’re a project manager who works with machine learning applications.
An excerpt from Secret Key Cryptography by Frank Rubin
This article covers:
• Basic terms used in cryptography
• What is an unbreakable cipher?
• What are the different types of cryptography?
Read it if you’re interested in cryptography.
From the Application Security Program Handbook by Derek Fisher
This article discusses where security fits into the DevOps process along with some common approaches.
Read it if you want to learn more about baking security into DevOps.
From Secret Key Cryptography by Frank Rubin
This article covers:
· The rating system used for ciphers
· Substitution ciphers
· Transposition ciphers
· Fractionation, breaking letters into smaller units
· Pseudorandom number generators