Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Okta Administration Up and Running
  • Language: en
  • Pages: 306

Okta Administration Up and Running

Get to grips with the fundamentals of Zero trust, IAM, and Okta, while learning how to carry out foundational configuration of your own tenants with the help of step-by-step instructions Key Features Discover how to use Okta for complete identity and access management in your organization Explore agentless desktop single sign-on, multifactor authentication, and lifecycle management for enhanced security Learn about no-code and low-code automation functionalities, also known as Okta Workflows Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionIdentity and access management (IAM) is a set of policies and technologies used to ensure an organization’s security, by c...

Okta Administration: Up and Running
  • Language: en
  • Pages: 268

Okta Administration: Up and Running

Plan, design, and implement identity and access management solutions with Okta Key FeaturesLearn how to use Okta for complete identity and access management in your organizationUse single sign-on, multifactor authentication, and life cycle management for enhanced securitySet up, manage, and audit API access policiesBook Description IAM, short for identity and access management, is a set of policies and technologies for ensuring the security of an organization through careful role and access assignment for users and devices. With this book, you'll get up and running with Okta, an identity and access management (IAM) service that you can use for both employees and customers. Once you've unders...

Okta Administration Up and Running - Second Edition
  • Language: en

Okta Administration Up and Running - Second Edition

  • Type: Book
  • -
  • Published: 2023-12-22
  • -
  • Publisher: Unknown

Okta is one of the leading IAM platforms that consolidate identities for company tools.

Antivirus Bypass Techniques
  • Language: en
  • Pages: 242

Antivirus Bypass Techniques

Develop more secure and effective antivirus solutions by leveraging antivirus bypass techniques Key FeaturesGain a clear understanding of the security landscape and research approaches to bypass antivirus softwareBecome well-versed with practical techniques to bypass antivirus solutionsDiscover best practices to develop robust antivirus solutionsBook Description Antivirus software is built to detect, prevent, and remove malware from systems, but this does not guarantee the security of your antivirus solution as certain changes can trick the antivirus and pose a risk for users. This book will help you to gain a basic understanding of antivirus software and take you through a series of antivir...

The Emancipation of Biblical Philology in the Dutch Republic, 1590-1670
  • Language: en
  • Pages: 321

The Emancipation of Biblical Philology in the Dutch Republic, 1590-1670

A study of the school of biblical scholarship established by Joseph Scaliger in the Dutch Republic in the period 1590-1670.

Cybersecurity Strategies and Best Practices
  • Language: en
  • Pages: 252

Cybersecurity Strategies and Best Practices

Elevate your organization's cybersecurity posture by implementing proven strategies and best practices to stay ahead of emerging threats Key Features Benefit from a holistic approach and gain practical guidance to align security strategies with your business goals Derive actionable insights from real-world scenarios and case studies Demystify vendor claims and make informed decisions about cybersecurity solutions tailored to your needs Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionIf you are a cybersecurity professional looking for practical and actionable guidance to strengthen your organization’s security, then this is the book for you. Cybersecurity Stra...

PowerShell 7 Workshop
  • Language: en
  • Pages: 468

PowerShell 7 Workshop

Leverage PowerShell 7 to write code on Windows, Linux, and Raspberry Pi to accomplish real-world tasks with this practical guide Key Features Master the art of coding with Microsoft’s free, open-source cross-platform language Understand essential programming concepts such as loops and objects through practical examples Practice using PowerShell 7 with websites, APIs, and physical computing devices like Raspberry Pi Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionDiscover the capabilities of PowerShell 7 for your everyday tasks with this carefully paced tutorial that will help you master this versatile programming language. The first set of chapters will show ...

Keycloak - Identity and Access Management for Modern Applications
  • Language: en
  • Pages: 362

Keycloak - Identity and Access Management for Modern Applications

Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in applications Key Features Get up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examples Configure, manage, and extend Keycloak for optimized security Leverage Keycloak features to secure different application types Book DescriptionImplementing authentication and authorization for applications can be a daunting experience, often leaving them exposed to security vulnerabilities. Keycloak is an open-source solution for identity management and access management for modern applications, which can make a world of diff...

Who Owns Whom
  • Language: en
  • Pages: 2810

Who Owns Whom

  • Type: Book
  • -
  • Published: 2008
  • -
  • Publisher: Unknown

None

Zscaler Cloud Security Essentials
  • Language: en
  • Pages: 236

Zscaler Cloud Security Essentials

Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provide a zero-trust network access solution for private enterprise application access to end users Key FeaturesGet up to speed with Zscaler without the need for expensive trainingImplement Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) security solutions with real-world deploymentsFind out how to choose the right options and features to architect a customized solution with ZscalerBook Description Many organizations are moving away from on-premises solutions to simplify administration and reduce expensive hardware upgrades. This book uses real-world examples of deployments to help you...