Da: Dream Books Co., Denver, CO, U.S.A.
Condizione: good. Gently used with minimal wear on the corners and cover. A few pages may contain light highlighting or writing, but the text remains fully legible. Dust jacket may be missing, and supplemental materials like CDs or codes may not be included. May be ex-library with library markings. Ships promptly!
Da: Seattle Goodwill, Seattle, WA, U.S.A.
paperback. Condizione: Good.
Editore: Shroff Publishers & Distributors Pvt Ltd, 2016
ISBN 10: 9352133803 ISBN 13: 9789352133802
Lingua: Inglese
Da: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condizione: Fair. No Jacket. Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend Less 0.62.
Editore: O'Reilly Media, Incorporated, 2016
ISBN 10: 1491937017 ISBN 13: 9781491937013
Lingua: Inglese
Da: Better World Books, Mishawaka, IN, U.S.A.
Prima edizione
Condizione: Very Good. 1st Edition. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects.
Editore: O'Reilly Media, Incorporated, 2016
ISBN 10: 1491937017 ISBN 13: 9781491937013
Lingua: Inglese
Da: Better World Books: West, Reno, NV, U.S.A.
Prima edizione
Condizione: Good. 1st Edition. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages.
Paperback. Condizione: Very Good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority!
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: New.
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: As New. Unread book in perfect condition.
EUR 41,08
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: New. Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected. Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity-without compromising usability. You'll learn how to plug holes in existing systems, protect against viable attack vectors, and work in environments that sometimes are naturally insecure.Understand the state of web and application security today Design security password encryption, and combat password attack vectors Create digital fingerprints to identify users through browser, device, and paired device detection Build secure data transmission systems through OAuth and OpenID Connect Use alternate methods of identification for a second factor of authentication Harden your web applications against attack Create a secure data transmission system using SSL/TLS, and synchronous and asynchronous cryptography.
Paperback. Condizione: New. Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected. Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity-without compromising usability. You'll learn how to plug holes in existing systems, protect against viable attack vectors, and work in environments that sometimes are naturally insecure.Understand the state of web and application security today Design security password encryption, and combat password attack vectors Create digital fingerprints to identify users through browser, device, and paired device detection Build secure data transmission systems through OAuth and OpenID Connect Use alternate methods of identification for a second factor of authentication Harden your web applications against attack Create a secure data transmission system using SSL/TLS, and synchronous and asynchronous cryptography.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 29,73
Quantità: 2 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 31,56
Quantità: 2 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 39,91
Quantità: 2 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: Revaluation Books, Exeter, Regno Unito
EUR 55,06
Quantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 1st edition. 188 pages. 9.25x7.00x0.50 inches. In Stock.
EUR 33,11
Quantità: 2 disponibili
Aggiungi al carrelloCondizione: New. With this practical guide, you ll learn how and why everyone working on a system needs to ensure that users and data are protected. The authors provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure inte.
EUR 43,38
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New. Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected. Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity-without compromising usability. You'll learn how to plug holes in existing systems, protect against viable attack vectors, and work in environments that sometimes are naturally insecure.Understand the state of web and application security today Design security password encryption, and combat password attack vectors Create digital fingerprints to identify users through browser, device, and paired device detection Build secure data transmission systems through OAuth and OpenID Connect Use alternate methods of identification for a second factor of authentication Harden your web applications against attack Create a secure data transmission system using SSL/TLS, and synchronous and asynchronous cryptography.
EUR 36,37
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: New. Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected. Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity-without compromising usability. You'll learn how to plug holes in existing systems, protect against viable attack vectors, and work in environments that sometimes are naturally insecure.Understand the state of web and application security today Design security password encryption, and combat password attack vectors Create digital fingerprints to identify users through browser, device, and paired device detection Build secure data transmission systems through OAuth and OpenID Connect Use alternate methods of identification for a second factor of authentication Harden your web applications against attack Create a secure data transmission system using SSL/TLS, and synchronous and asynchronous cryptography.
ISBN 10: 7519814203 ISBN 13: 9787519814205
Da: liu xing, Nanjing, JS, Cina
paperback. Condizione: New. Language:Chinese.Paperback. Pub Date: 2018-01-01 Pages: 204 Publisher: China power press this book discussed the building interface to protect the safety of data and status to grasp the concepts. techniques and programming methodology. and availability.You will learn how to make up for the existing system vulnerabilities. defend against various media. and how to protection of the natural environment from the.
Da: Revaluation Books, Exeter, Regno Unito
EUR 43,36
Quantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 1st edition. 188 pages. 9.25x7.00x0.50 inches. In Stock. This item is printed on demand.