Buy toolchain.eu ?

Products related to Security:


  • computer hardware software Antivirus software online download Norton Security Antivirus key download
    computer hardware software Antivirus software online download Norton Security Antivirus key download

    Wholesale Price ,Trade Assurance | Alibaba.com

    Price: 12.0 € | Shipping*: 0.00 €
  • Human Factors in Engineering : Manufacturing Systems, Automation, and Interactions
    Human Factors in Engineering : Manufacturing Systems, Automation, and Interactions

    This book addresses aspects of human factors in engineering and provides a detailed discussion of novel approaches, systems engineering tools, artificial cognitive systems, and intelligent technologies and automation.It presents applications in diverse areas, including digital manufacturing, transportation, infrastructure development, and cybersecurity. This book:• Merges the engineering perspective with the human factors and social dimension of computing and artificial intelligence–based technologies. • Covers technological development of human factors engineering and the human dimension in applications across all areas of modern society. • Relates to human behavior in the context of technology and systems interactions. • Discusses the design and the appropriation of 3D printing techniques in the management of an innovative product system. • Presents systems engineering tools, user experience methodologies, artificial cognitive systems, intelligent technologies, and automation. The text is for students, professionals, and researchers in the fields of ergonomics, human factors, industrial engineering, and manufacturing engineering.

    Price: 115.00 £ | Shipping*: 0.00 £
  • Development and Security
    Development and Security


    Price: 65.57 £ | Shipping*: 0.00 £
  • Identity Security for Software Development : Building with Identity, Secrets, and Credentials
    Identity Security for Software Development : Building with Identity, Secrets, and Credentials

    Maintaining secrets, credentials, and nonhuman identities in secure ways is an important, though often overlooked, aspect of secure software development.Cloud migration and digital transformation have led to an explosion of nonhuman identities—like automation scripts, cloud native apps, and DevOps tools—that need to be secured across multiple cloud and hybrid environments. DevOps security often addresses vulnerability scanning, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches.That's where an identity security strategy focused on secrets management can help. In this practical book, authors John Walsh and Uzi Ailon provide conceptual frameworks, technology overviews, and practical code snippets to help DevSecOps engineers, cybersecurity engineers, security managers, and software developers address use cases across CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, automation/RPA, IOT/OT, and more.You'll learn:The fundamentals of authentication, authorization, access control, and secrets managementWhat developers need to know about managing secrets and identity to build safer appsWhat nonhuman identities, secrets, and credentials are—and how to secure themHow developers work with their cross-function peers to build safer appsHow identity security fits into modern software development practices

    Price: 47.99 £ | Shipping*: 0.00 £

Similar search terms for Security:


  • Security Patterns : Integrating Security and Systems Engineering
    Security Patterns : Integrating Security and Systems Engineering

    Most security books are targeted at security engineers and specialists.Few show how build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational layers.Security Patterns addresses the full spectrum of security in systems design, using best practice solutions to show how to integrate security in the broader engineering process. Essential for designers building large-scale systems who want best practice solutions to typical security problemsReal world case studies illustrate how to use the patterns in specific domains For more information visit www.securitypatterns.org

    Price: 40.00 £ | Shipping*: 0.00 £
  • Software Test Automation : Software Test Automation
    Software Test Automation : Software Test Automation

    This book describes how to build and implement an automated testing regime for software development.It presents a detailed account of the principles of automated testing, practical techniques for designing a good automated testing regime, and advice on choosing and applying off-the-shelf testing tools to specific needs.This sound and practical introduction to automated testing comes from two authors well known for their seminars, consultancy and training in the field.

    Price: 77.99 £ | Shipping*: 0.00 £
  • Software Supply Chain Security : Securing the End-to-End Supply Chain for Software, Firmware, and Hardware
    Software Supply Chain Security : Securing the End-to-End Supply Chain for Software, Firmware, and Hardware

    Trillions of lines of code help us in our lives, companies, and organizations.But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery.Securing the creation and deployment of software, also known as software supply chain security, goes well beyond the software development process. This practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain.Author Cassie Crossley demonstrates how and why everyone involved in the supply chain needs to participate if your organization is to improve the security posture of its software, firmware, and hardware. With this book, you'll learn how to:Pinpoint the cybersecurity risks in each part of your organization's software supply chainFind the cybersecurity frameworks and resources that can improve securityIdentify the roles that participate in the supply chain-including IT, development, operations, manufacturing, and procurementDesign initiatives and controls for each part of the supply chain using existing frameworks and referencesEvaluate third-party risk in your supply chain

    Price: 44.99 £ | Shipping*: 0.00 £
  • Advanced Manufacturing and Automation VIII
    Advanced Manufacturing and Automation VIII

    This proceeding is a compilation of selected papers from the 8th International Workshop of Advanced Manufacturing and Automation (IWAMA 2018), held in Changzhou, China on September 25 - 26, 2018.Most of the topics are focusing on novel techniques for manufacturing and automation in Industry 4.0 and smart factory.These contributions are vital for maintaining and improving economic development and quality of life.The proceeding will assist academic researchers and industrial engineers to implement the concepts and theories of Industry 4.0 in industrial practice, in order to effectively respond to the challenges posed by the 4th industrial revolution and smart factory.

    Price: 179.99 £ | Shipping*: 0.00 £

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.