語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Mastering secure Java applications : = navigating security in cloud and microservices for Java /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Mastering secure Java applications :/ Tarun Kumar Chawdhury, Joyanta Banerjee, Vipul Gupta, Debopam Poddar.
其他題名:
navigating security in cloud and microservices for Java /
作者:
Chawdhury, Tarun Kumar.
其他作者:
Poddar, Debopam,
面頁冊數:
1 online resource (346 pages)
標題:
COMPUTERS / Languages / Java. -
電子資源:
https://portal.igpublish.com/iglibrary/search/BPB0000584.html
ISBN:
9789355516466
Mastering secure Java applications : = navigating security in cloud and microservices for Java /
Chawdhury, Tarun Kumar.
Mastering secure Java applications :
navigating security in cloud and microservices for Java /Tarun Kumar Chawdhury, Joyanta Banerjee, Vipul Gupta, Debopam Poddar. - 1 online resource (346 pages)
Includes bibliographical references and index.
Mastering secure Java applications : navigating security in cloud and microservices for Java -- About the Authors -- Acknowledgements -- Preface -- Table of Contents -- Chapter 1. Secure Design Principles for Java Applications -- Chapter 2. Analyzing and Securing Source Code -- Chapter 3. Securing Java Runtime -- Chapter 4. Application Data Security -- Chapter 5. Application Observability and Threat Protection -- Chapter 6. Integration with Vault -- Chapter 7. Established Solution Architecture and Patterns -- Chapter 8. Real-world Case Studies and Solutions -- Chapter 9. Java Software Licensing Model -- Chapter 10. Secure Coding Tips and Practices -- Index.
Access restricted to authorized users and institutions.
This book offers a comprehensive guide to implementing Zero-Trust security principles, cloud-based defenses, and robust application development practices. Through practical examples and expert advice, readers will gain the skills needed to design and develop secure Java applications that easily can tackle today's cyber threats. It builds focus on securing your source code through analysis, vulnerability detection, and automation. It also ensures the safety of your runtime environment for managing traffic and enables multi-factor authentication. While addressing data security concerns with encryption, anonymization, and cloud-based solutions, it also uses tools like OpenTelemetry for real-time threat detection. It manages sensitive information securely with Vault integration and explores passwordless authentication. Reference architectures, secure coding patterns, and automation practices are also provided to aid implementation. By the end of this book, you'll be well-equipped to build secure Java applications with confidence and deliver applications that are robust, reliable, and compliant.
Mode of access: World Wide Web.
ISBN: 9789355516466Subjects--Topical Terms:
1483934
COMPUTERS / Languages / Java.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Mastering secure Java applications : = navigating security in cloud and microservices for Java /
LDR
:02822nam a2200289 i 4500
001
1157327
006
m eo d
007
cr cn |||m|||a
008
250717s2024 ob 000 0 eng d
020
$a
9789355516466
020
$a
9789355518842
035
$a
BPB0000584
041
0
$a
eng
050
0 0
$a
QA76.9.A25
082
0 0
$a
005.8
100
1
$a
Chawdhury, Tarun Kumar.
$3
1483929
245
1 0
$a
Mastering secure Java applications :
$b
navigating security in cloud and microservices for Java /
$c
Tarun Kumar Chawdhury, Joyanta Banerjee, Vipul Gupta, Debopam Poddar.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2024.
264
4
$c
©2024
300
$a
1 online resource (346 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
Mastering secure Java applications : navigating security in cloud and microservices for Java -- About the Authors -- Acknowledgements -- Preface -- Table of Contents -- Chapter 1. Secure Design Principles for Java Applications -- Chapter 2. Analyzing and Securing Source Code -- Chapter 3. Securing Java Runtime -- Chapter 4. Application Data Security -- Chapter 5. Application Observability and Threat Protection -- Chapter 6. Integration with Vault -- Chapter 7. Established Solution Architecture and Patterns -- Chapter 8. Real-world Case Studies and Solutions -- Chapter 9. Java Software Licensing Model -- Chapter 10. Secure Coding Tips and Practices -- Index.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
This book offers a comprehensive guide to implementing Zero-Trust security principles, cloud-based defenses, and robust application development practices. Through practical examples and expert advice, readers will gain the skills needed to design and develop secure Java applications that easily can tackle today's cyber threats. It builds focus on securing your source code through analysis, vulnerability detection, and automation. It also ensures the safety of your runtime environment for managing traffic and enables multi-factor authentication. While addressing data security concerns with encryption, anonymization, and cloud-based solutions, it also uses tools like OpenTelemetry for real-time threat detection. It manages sensitive information securely with Vault integration and explores passwordless authentication. Reference architectures, secure coding patterns, and automation practices are also provided to aid implementation. By the end of this book, you'll be well-equipped to build secure Java applications with confidence and deliver applications that are robust, reliable, and compliant.
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / Languages / Java.
$2
bisacsh
$3
1483934
650
7
$a
COMPUTERS / Programming / Object Oriented.
$2
bisacsh
$3
1483933
650
7
$a
COMPUTERS / Security / Network Security.
$2
bisacsh
$3
1483836
650
7
$a
COMPUTERS / Computer Science.
$2
bisacsh
$3
1483847
655
4
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Poddar, Debopam,
$e
author
$3
1483932
700
1
$a
Gupta, Vipul,
$e
author
$3
1483931
700
1
$a
Banerjee, Joyanta,
$e
author
$3
1483930
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000584.html
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入