Based on unique and previously undocumented research, this book by noted iOS expert Jonathan Zdziarski shows the numerous weaknesses that exist in typical iPhone and iPad apps. Zdziarski shows finance companies, large institutions and others where t
论述API设计时的主要设计模式,关注API安全,概述OAuth2.0框架及相关衍生协议。 Advanced API Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs. API adoption in both consumer and enterprises has gone beyond predict
In Expert Hadoop® Administration, leading Hadoop administrator Sam R. Alapati brings together authoritative knowledge for creating, configuring, securing, managing, and optimizing production Hadoop cl usters in any environment. Drawing on his experi
Chapter 1: Introduction to Web Services Security Chapter 2: Web Services Security—Architectural Overview Chapter 3: Architecture Overview of Oracle WSM Chapter 4: Authentication and Authorization of Web Services Using Oracle WSM Chapter 5: Encryptin
This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hackin
This document describes security in the Debian project and in the Debian operating system. Starting with the process of securing and hardening the default Debian GNU/Linux distribution installation, it also covers some of the common tasks to set up a
Chapter 1. Everything You Know Is Wrong Part I: Hacking Chapter 2. The Basics of Compromising iOS Chapter 3. Stealing the Filesystem Chapter 4. Forensic Trace and Data Leakage Chapter 5. Defeating Encryption Chapter 6. Unobliterating Files Chapter 7