Buy software-workshop.eu ?

Products related to Security:


  • Programming Machine Learning : From Coding to Deep Learning
    Programming Machine Learning : From Coding to Deep Learning

    You've decided to tackle machine learning - because you're job hunting, embarking on a new project, or just think self-driving cars are cool.But where to start? It's easy to be intimidated, even as a software developer.The good news is that it doesn't have to be that hard.Master machine learning by writing code one line at a time, from simple learning programs all the way to a true deep learning system.Tackle the hard topics by breaking them down so they're easier to understand, and build your confidence by getting your hands dirty.Peel away the obscurities of machine learning, starting from scratch and going all the way to deep learning.Machine learning can be intimidating, with its reliance on math and algorithms that most programmers don't encounter in their regular work.Take a hands-on approach, writing the Python code yourself, without any libraries to obscure what's really going on.Iterate on your design, and add layers of complexity as you go.Build an image recognition application from scratch with supervised learning.Predict the future with linear regression. Dive into gradient descent, a fundamental algorithm that drives most of machine learning.Create perceptrons to classify data. Build neural networks to tackle more complex and sophisticated data sets.Train and refine those networks with backpropagation and batching.Layer the neural networks, eliminate overfitting, and add convolution to transform your neural network into a true deep learning system.Start from the beginning and code your way to machine learning mastery.What You Need: The examples in this book are written in Python, but don't worry if you don't know this language: you'll pick up all the Python you need very quickly.Apart from that, you'll only need your computer, and your code-adept brain.

    Price: 38.50 £ | Shipping*: 0.00 £
  • Identity Security for Software Development : Building with Identity, Secrets, and Credentials
    Identity Security for Software Development : Building with Identity, Secrets, and Credentials

    Maintaining secrets, credentials, and nonhuman identities in secure ways is an important, though often overlooked, aspect of secure software development.Cloud migration and digital transformation have led to an explosion of nonhuman identities—like automation scripts, cloud native apps, and DevOps tools—that need to be secured across multiple cloud and hybrid environments. DevOps security often addresses vulnerability scanning, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches.That's where an identity security strategy focused on secrets management can help. In this practical book, authors John Walsh and Uzi Ailon provide conceptual frameworks, technology overviews, and practical code snippets to help DevSecOps engineers, cybersecurity engineers, security managers, and software developers address use cases across CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, automation/RPA, IOT/OT, and more.You'll learn:The fundamentals of authentication, authorization, access control, and secrets managementWhat developers need to know about managing secrets and identity to build safer appsWhat nonhuman identities, secrets, and credentials are—and how to secure themHow developers work with their cross-function peers to build safer appsHow identity security fits into modern software development practices

    Price: 47.99 £ | Shipping*: 0.00 £
  • Development and Security
    Development and Security


    Price: 65.57 £ | Shipping*: 0.00 £
  • 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
    24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Eradicate the Most Notorious Insecure Designs and Coding VulnerabilitiesFully updated to cover the latest security issues, 24 Deadly Sins of Software Security reveals the most common design and coding errors and explains how to fix each one-or better yet, avoid them from the start.Michael Howard and David LeBlanc, who teach Microsoft employees and the world how to secure code, have partnered again with John Viega, who uncovered the original 19 deadly programming sins.They have completely revised the book to address the most recent vulnerabilities and have added five brand-new sins.This practical guide covers all platforms, languages, and types of applications.Eliminate these security flaws from your code: SQL injection Web server- and client-related vulnerabilitiesUse of magic URLs, predictable cookies, and hidden form fieldsBuffer overrunsFormat string problemsInteger overflowsC++ catastrophesInsecure exception handlingCommand injectionFailure to handle errorsInformation leakageRace conditionsPoor usabilityNot updating easilyExecuting code with too much privilegeFailure to protect stored dataInsecure mobile codeUse of weak password-based systemsWeak random numbersUsing cryptography incorrectlyFailing to protect network trafficImproper use of PKITrusting network name resolution

    Price: 60.99 £ | Shipping*: 0.00 £
  • Is learning programming and software development very challenging?

    Learning programming and software development can be challenging for some people, as it requires logical thinking, problem-solving skills, and attention to detail. However, with dedication, practice, and the right resources, it is definitely achievable. Breaking down complex concepts into smaller, more manageable parts and seeking help from online tutorials, courses, and communities can make the learning process easier and more enjoyable. Ultimately, the level of challenge will vary depending on the individual's background, experience, and learning style.

  • Which education is suitable for IT security or software development?

    For a career in IT security or software development, a formal education in computer science, information technology, or a related field is typically recommended. A bachelor's degree in computer science can provide a strong foundation in programming, algorithms, and computer systems, which are essential skills for both IT security and software development roles. Additionally, pursuing certifications in cybersecurity or software development can also help enhance your skills and credibility in the field. Ultimately, the most suitable education will depend on your specific career goals and interests within the IT industry.

  • How does coding and code security work?

    Coding involves writing instructions in a programming language to create software or applications. Code security involves implementing measures to protect this code from unauthorized access, modification, or exploitation. This can include using encryption, authentication, and access control mechanisms to safeguard the code and the data it processes. Regular code reviews, testing, and updates are also essential to identify and address vulnerabilities that could be exploited by malicious actors.

  • Which security software do you use?

    I use a combination of security software to ensure comprehensive protection for my devices. This includes antivirus software to protect against malware and viruses, a firewall to monitor and control incoming and outgoing network traffic, and a virtual private network (VPN) to encrypt my internet connection and protect my online privacy. I also regularly update my operating system and software to patch any security vulnerabilities.

Similar search terms for Security:


  • Learning eBPF : Programming the Linux Kernel for Enhanced Observability, Networking, and Security
    Learning eBPF : Programming the Linux Kernel for Enhanced Observability, Networking, and Security

    What is eBPF? With this revolutionary technology, you can write custom code that dynamically changes the way the kernel behaves.It's an extraordinary platform for building a whole new generation of security, observability, and networking tools. This practical book is ideal for developers, system administrators, operators, and students who are curious about eBPF and want to know how it works.Author Liz Rice, chief open source officer with cloud native networking and security specialists Isovalent, also provides a foundation for those who want to explore writing eBPF programs themselves. With this book, you will:Learn why eBPF has become so important in the past couple of yearsWrite basic eBPF code, and manipulate eBPF programs and attach them to eventsExplore how eBPF components interact with Linux to dynamically change the operating system's behaviorLearn how tools based on eBPF can instrument applications without changes to the apps or their configurationDiscover how this technology enables new tools for observability, security, and networking

    Price: 44.99 £ | Shipping*: 0.00 £
  • AVAST Software ESSENTIAL BUSINESS SECURITY
    AVAST Software ESSENTIAL BUSINESS SECURITY

    AVAST Software ESSENTIAL BUSINESS SECURITY

    Price: 22.86 £ | Shipping*: 0.00 £
  • Energy Security and Sustainable Development
    Energy Security and Sustainable Development


    Price: 48.97 £ | Shipping*: 0.00 £
  • Learning, Training, and Development in Organizations
    Learning, Training, and Development in Organizations

    This scholarly book in SIOP’s Organizational Frontier series looks at research on enhancing knowledge acquisition and its application in organizations.It concentrates on training, design and delivery given the changing nature of work and organizations.Now that work is increasingly complex, there is greater emphasis on expertise and cognitive skills.Advances in technology such as computer simulations and web-based training are necessitating a more active role for the learner in the training process.In the broad context of the organization systems, this book promotes learning and development as a continuous lifelong endeavor.

    Price: 46.99 £ | Shipping*: 0.00 £
  • Where should I start learning IT security?

    A good place to start learning IT security is by gaining a foundational understanding of basic networking concepts, operating systems, and programming languages. You can then move on to studying specific areas of IT security such as cryptography, ethical hacking, and security protocols. Additionally, pursuing certifications like CompTIA Security+ or Certified Information Systems Security Professional (CISSP) can help you gain credibility and expertise in the field. Finally, staying updated on the latest trends and threats in IT security through online resources, forums, and attending conferences can further enhance your knowledge and skills.

  • What is social security training?

    Social security training refers to programs and courses designed to educate individuals about the social security system and how it works. This training typically covers topics such as eligibility requirements, benefits calculation, application procedures, and rights and responsibilities of beneficiaries. The goal of social security training is to help individuals understand their entitlements and make informed decisions about their retirement, disability, and survivor benefits. This training can be provided by government agencies, non-profit organizations, or financial institutions.

  • Which programming languages are used in software development?

    There are many programming languages used in software development, including popular languages such as Java, Python, C++, JavaScript, and Ruby. Each language has its own strengths and is used for different purposes in software development. For example, Java is commonly used for building enterprise-level applications, while Python is known for its simplicity and versatility. C++ is often used for system software and game development, while JavaScript is essential for web development. Overall, the choice of programming language depends on the specific requirements of the software being developed.

  • What is the training for a specialist in protection and security (Security)?

    The training for a specialist in protection and security typically includes a combination of classroom instruction and hands-on training. This may involve learning about security protocols, emergency response procedures, risk assessment, surveillance techniques, and conflict resolution. Additionally, specialists may receive training in physical fitness, self-defense, and the use of security equipment and technology. Depending on the specific role, they may also receive specialized training in areas such as cybersecurity, crowd control, or executive protection. Overall, the training is designed to prepare specialists to effectively protect people, property, and information from potential threats.

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.