Listing 1 - 7 of 7
Sort by

Periodical
InfoStor.
Year: 1997 Publisher: Tulsa, OK : PennWell Pub.,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Periodical
InfoStor.
Year: 1997 Publisher: Tulsa, OK : PennWell Pub.,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Cloud native software security handbook : unleash the power of cloud native tools for robust security in modern applications
Author:
ISBN: 1837636524 Year: 2023 Publisher: Birmingham, England : Packt Publishing Ltd.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Master widely used cloud native platforms like Kubernetes, Calico, Kibana, Grafana, Anchor, and more to ensure secure infrastructure and software development Purchase of the print or Kindle book includes a free PDF eBookKey FeaturesLearn how to select cloud-native platforms and integrate security solutions into the systemLeverage cutting-edge tools and platforms securely on a global scale in production environmentsUnderstand the laws and regulations necessary to prevent federal prosecutionBook DescriptionFor cloud security engineers, it’s crucial to look beyond the limited managed services provided by cloud vendors and make use of the wide array of cloud native tools available to developers and security professionals, which enable the implementation of security solutions at scale. This book covers technologies that secure infrastructure, containers, and runtime environments using vendor-agnostic cloud native tools under the Cloud Native Computing Foundation (CNCF). The book begins with an introduction to the whats and whys of the cloud native environment, providing a primer on the platforms that you’ll explore throughout. You’ll then progress through the book, following the phases of application development. Starting with system design choices, security trade-offs, and secure application coding techniques that every developer should be mindful of, you’ll delve into more advanced topics such as system security architecture and threat modelling practices. The book concludes by explaining the legal and regulatory frameworks governing security practices in the cloud native space and highlights real-world repercussions that companies have faced as a result of immature security practices. By the end of this book, you'll be better equipped to create secure code and system designs.What you will learnUnderstand security concerns and challenges related to cloud-based app developmentExplore the different tools for securing configurations, networks, and runtimeImplement threat modeling for risk mitigation strategiesDeploy various security solutions for the CI/CD pipelineDiscover best practices for logging, monitoring, and alertingUnderstand regulatory compliance product impact on cloud securityWho this book is forThis book is for developers, security professionals, and DevOps teams involved in designing, developing, and deploying cloud native applications. It benefits those with a technical background seeking a deeper understanding of cloud-native security and the latest tools and technologies for securing cloud native infrastructure and runtime environments. Prior experience with cloud vendors and their managed services is advantageous for leveraging the tools and platforms covered in this book.


Book
Inside Apple : dans les coulisses de l'entreprise la plus secrète au monde.
Author:
ISBN: 9782100579648 2100579649 Year: 2012 Publisher: Paris Dunod

Loading...
Export citation

Choose an application

Bookmark

Abstract

Journaliste spécialisé dans les nouvelles technologies, Adam Lashinsky a enquêté pendant de longs mois sur Apple et raconte dans cet ouvrage très documenté quelques-uns des secrets les mieux gardés de la firme à la pomme en matière d'innovation, de marketing, de communication, de management et de lobbying. Il revient sur l'histoire de la compagnie et s'attarde sur la personnalité de Steve Jobs et la façon dont celui-ci a façonné l'entreprise. Il offre également de nombreux éclairages sur les pièges qui attendent Apple aujourd'hui que son charismatique fondateur a disparu ...


Periodical
Card technology today.
ISSN: 18736521 09652590 Year: 2009 Publisher: Amsterdam ; New York : Elsevier Science,


Periodical
Card technology.
ISSN: 19304501 Publisher: New York, NY : American Banker-Bond Buyer


Book
Magnetoelectric response in low-dimensional frustrated spin systems
Author:
ISSN: 21905053 ISBN: 4431546820 4431540903 9786613945426 1283632977 4431540911 Year: 2012 Publisher: Tokyo : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Electric control of magnetic properties, or inversely, magnetic control of dielectric properties in solids, is called a magnetoelectric effect and has long been investigated from the point of view of both fundamental physics and potential application. Magnetic and dielectric properties usually show minimal coupling, but it recently has been discovered that magnetically induced ferroelectricity in some spiral magnets enables remarkably large and versatile magnetoelectric responses. To stabilize such helimagnetism, magnetic frustration (competition between different magnetic interactions) is considered the key. In the present work, two of the most typical frustrated spin systems—triangular lattice antiferromagnets and edge-shared chain magnets—have systematically been investigated. Despite the crystallographic simplicity of target systems, rich magnetoelectric responses are ubiquitously observed. The current results published here offer a useful guideline in the search for new materials with unique magnetoelectric functions, and also provide an important basis for a deeper understanding of magnetoelectric phenomena in more complex systems.

Listing 1 - 7 of 7
Sort by