Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Mastering secure Java applications = navigating security in cloud and microservices for Java /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Mastering secure Java applications / Tarun Kumar Chawdhury, Joyanta Banerjee, Vipul Gupta, Debopam Poddar.
Reminder of title:
navigating security in cloud and microservices for Java /
Author:
Chawdhury, Tarun Kumar.
other author:
Banerjee, Joyanta,
Description:
1 online resource (346 pages)
Subject:
COMPUTERS / Computer Science. -
Online resource:
https://portal.igpublish.com/iglibrary/search/BPB0000584.html
ISBN:
9789355516466
Mastering secure Java applications = navigating security in cloud and microservices for Java /
Chawdhury, Tarun Kumar.
Mastering secure Java applications
navigating security in cloud and microservices for Java /[electronic resource] :Tarun Kumar Chawdhury, Joyanta Banerjee, Vipul Gupta, Debopam Poddar. - 1 online resource (346 pages)
Includes bibliographical references and index.
Mastering secure Java applications : navigating security in cloud and microservices for Java -- About the Authors -- Acknowledgements -- Preface -- Table of Contents -- Chapter 1. Secure Design Principles for Java Applications -- Chapter 2. Analyzing and Securing Source Code -- Chapter 3. Securing Java Runtime -- Chapter 4. Application Data Security -- Chapter 5. Application Observability and Threat Protection -- Chapter 6. Integration with Vault -- Chapter 7. Established Solution Architecture and Patterns -- Chapter 8. Real-world Case Studies and Solutions -- Chapter 9. Java Software Licensing Model -- Chapter 10. Secure Coding Tips and Practices -- Index.
Access restricted to authorized users and institutions.
This book offers a comprehensive guide to implementing Zero-Trust security principles, cloud-based defenses, and robust application development practices. Through practical examples and expert advice, readers will gain the skills needed to design and develop secure Java applications that easily can tackle today's cyber threats. It builds focus on securing your source code through analysis, vulnerability detection, and automation. It also ensures the safety of your runtime environment for managing traffic and enables multi-factor authentication. While addressing data security concerns with encryption, anonymization, and cloud-based solutions, it also uses tools like OpenTelemetry for real-time threat detection. It manages sensitive information securely with Vault integration and explores passwordless authentication. Reference architectures, secure coding patterns, and automation practices are also provided to aid implementation. By the end of this book, you'll be well-equipped to build secure Java applications with confidence and deliver applications that are robust, reliable, and compliant.
Mode of access: World Wide Web.
ISBN: 9789355516466Subjects--Topical Terms:
1483847
COMPUTERS / Computer Science.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Mastering secure Java applications = navigating security in cloud and microservices for Java /
LDR
:02848nam a2200289 i 4500
001
1157327
006
m eo d
007
cr cn |||m|||a
008
250717s2024 ob 000 0 eng d
020
$a
9789355516466
020
$a
9789355518842
035
$a
BPB0000584
041
0 #
$a
eng
050
0 0
$a
QA76.9.A25
082
0 0
$a
005.8
100
1
$a
Chawdhury, Tarun Kumar.
$3
1483929
245
1 0
$a
Mastering secure Java applications
$b
navigating security in cloud and microservices for Java /
$c
Tarun Kumar Chawdhury, Joyanta Banerjee, Vipul Gupta, Debopam Poddar.
$h
[electronic resource] :
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2024.
264
4
$c
©2024
300
$a
1 online resource (346 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0 #
$a
Mastering secure Java applications : navigating security in cloud and microservices for Java -- About the Authors -- Acknowledgements -- Preface -- Table of Contents -- Chapter 1. Secure Design Principles for Java Applications -- Chapter 2. Analyzing and Securing Source Code -- Chapter 3. Securing Java Runtime -- Chapter 4. Application Data Security -- Chapter 5. Application Observability and Threat Protection -- Chapter 6. Integration with Vault -- Chapter 7. Established Solution Architecture and Patterns -- Chapter 8. Real-world Case Studies and Solutions -- Chapter 9. Java Software Licensing Model -- Chapter 10. Secure Coding Tips and Practices -- Index.
506
#
$a
Access restricted to authorized users and institutions.
520
3
$a
This book offers a comprehensive guide to implementing Zero-Trust security principles, cloud-based defenses, and robust application development practices. Through practical examples and expert advice, readers will gain the skills needed to design and develop secure Java applications that easily can tackle today's cyber threats. It builds focus on securing your source code through analysis, vulnerability detection, and automation. It also ensures the safety of your runtime environment for managing traffic and enables multi-factor authentication. While addressing data security concerns with encryption, anonymization, and cloud-based solutions, it also uses tools like OpenTelemetry for real-time threat detection. It manages sensitive information securely with Vault integration and explores passwordless authentication. Reference architectures, secure coding patterns, and automation practices are also provided to aid implementation. By the end of this book, you'll be well-equipped to build secure Java applications with confidence and deliver applications that are robust, reliable, and compliant.
538
$a
Mode of access: World Wide Web.
650
# 7
$a
COMPUTERS / Computer Science.
$2
bisacsh
$3
1483847
650
# 7
$a
COMPUTERS / Security / Network Security.
$2
bisacsh
$3
1483836
650
# 7
$a
COMPUTERS / Programming / Object Oriented.
$2
bisacsh
$3
1483933
650
# 7
$a
COMPUTERS / Languages / Java.
$2
bisacsh
$3
1483934
655
# 4
$a
Electronic books.
$2
local
$3
554714
700
1 #
$a
Banerjee, Joyanta,
$e
author
$3
1483930
700
1 #
$a
Gupta, Vipul,
$e
author
$3
1483931
700
1 #
$a
Poddar, Debopam,
$e
author
$3
1483932
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000584.html
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login