From The Art of Network Penetration Testing by Royce Davis
From Practical Python Security by Dennis Byrne
From GitOps and Kubernetes by Billy Yuen, Alexander Matyushentsev, Todd Ekenstam, and Jesse Suen
This article delves into Canary deployments: what they are; how they work; and where you might consider using them.
From Spring in Action, 6th Edition by Craig Walls
From AWS Security by Dylan Shields
This article deals with methods you can use to secure your AWS account.
From API Security in Action by Neil Madden
In this article, you’ll implement capability-based access control techniques that enable secure sharing by taking the principle of least authority (POLA) to its logical conclusion and allowing fine-grained control over access to individual resources. Along the way, you’ll see how capabilities prevent a general category of attacks against APIs known as confused deputy attacks.
From Spring Security in Action by Laurentiu Spilca
This article delves into five awkward things that Spring Security does, which might be giving you trouble in your projects.