Books tagged: application security

The adult filter is active; there may be additional content. To view this content, click the "Adult Content" button above to change your filtering option.

Found 4 results

IT Infrastructure Risk & Vulnerability Library: A Consolidated Register of Operational and Technology Infrastructure Vulnerabilities for IT Assurance Professionals
Price: $65.95 USD. Words: 21,750. Language: English. Published: May 9, 2018. Categories: Nonfiction » Computers and Internet » Networking / security, Nonfiction » Computers and Internet » Security
"IT Infrastructure Risk & Vulnerability Library" is a library that captured the most critical risks, vulnerabilities and control lapses associated with major IT infrastructure/assets used in today organizations to support the business. IT Auditors, Risk Managers and IT Security/Control Professionals can used this book to perform audit or security assessment of their IT assets and for remediation
Auditing your Payment Cards Processes, Systems and Applications: A Step By Step PCIDSS Compliant Audit Program (A Practical Guide for Payment Card Brand, Issuers, Acquirers, Processors and Switches)
Price: $45.95 USD. Words: 10,000. Language: English. Published: May 7, 2018. Categories: Nonfiction » Business & Economics » Auditing, Nonfiction » Computers and Internet » Security
"Auditing your Payment Cards Processes, Systems and Applications" is a guide book that provide IT Assurance professionals step by step information on how to carry out security audit of payment card infrastructure (systems and applications) in line with PCIDSS requirement. Internal Security Assessor (ISA) and QSA can use this book to prepare or assess their organization for PCIDSS compliance.
Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software
Price: $4.99 USD. Words: 2,420. Language: English. Published: July 17, 2012. Categories: Nonfiction » Computers and Internet » Security / cryptography, Nonfiction » Computers and Internet » Internet / security
Booklet for IT professionals, developers and security specialists on how to utilize IPSec protocol in order to protect data transmission between legacy applications which were created before secure communication became common practice. In many cases it is difficult or even impossible to make necessary changes in old software in order to implement commonly accepted secure protocols such as SSL/TLS.
Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build
Price: $4.99 USD. Words: 4,840. Language: English. Published: April 22, 2012. Categories: Nonfiction » Computers and Internet » Security / cryptography, Nonfiction » Computers and Internet » Software development & engineering / general
Booklet for developers and security professionals on how to implement code obfuscation, .NET strong name signing, and Authenticode code signing in order to protect applications deployment. The guide contains detailed description of different code signing implementation options from basic software to sophisticated hardware solution.