Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Okta Administration: Up and Running
  • Language: en
  • Pages: 268

Okta Administration: Up and Running

Plan, design, and implement identity and access management solutions with Okta Key FeaturesLearn how to use Okta for complete identity and access management in your organizationUse single sign-on, multifactor authentication, and life cycle management for enhanced securitySet up, manage, and audit API access policiesBook Description IAM, short for identity and access management, is a set of policies and technologies for ensuring the security of an organization through careful role and access assignment for users and devices. With this book, you'll get up and running with Okta, an identity and access management (IAM) service that you can use for both employees and customers. Once you've unders...

Okta Administration Up and Running
  • Language: en
  • Pages: 306

Okta Administration Up and Running

Get to grips with the fundamentals of Zero trust, IAM, and Okta, while learning how to carry out foundational configuration of your own tenants with the help of step-by-step instructions Key Features Discover how to use Okta for complete identity and access management in your organization Explore agentless desktop single sign-on, multifactor authentication, and lifecycle management for enhanced security Learn about no-code and low-code automation functionalities, also known as Okta Workflows Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionIdentity and access management (IAM) is a set of policies and technologies used to ensure an organization’s security, by c...

Okta Administration Up and Running - Second Edition
  • Language: en

Okta Administration Up and Running - Second Edition

  • Type: Book
  • -
  • Published: 2023-12-22
  • -
  • Publisher: Unknown

Okta is one of the leading IAM platforms that consolidate identities for company tools.

Secure by Design
  • Language: en
  • Pages: 659

Secure by Design

Summary Secure by Design teaches developers how to use design to drive security in software development. This book is full of patterns, best practices, and mindsets that you can directly apply to your real world development. You'll also learn to spot weaknesses in legacy code and how to address them. About the technology Security should be the natural outcome of your development process. As applications increase in complexity, it becomes more important to bake security-mindedness into every step. The secure-by-design approach teaches best practices to implement essential software features using design as the primary driver for security. About the book Secure by Design teaches you principles ...

OAuth 2 in Action
  • Language: en
  • Pages: 461

OAuth 2 in Action

"Provides pragmatic guidance on what to do ... and what not to do." - From the Foreword by Ian Glazer, Salesforce OAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization server, and resource server. You'll learn how to confidently and securely build and deploy OAuth on both the client and server sides. Foreword by Ian Glazer. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the Technology Think of OAuth 2 as the web version of a valet key. It is an HTTP-based security protocol that allows users of a service to enable applications to use that se...

Modern Computer Architecture and Organization
  • Language: en
  • Pages: 561

Modern Computer Architecture and Organization

A no-nonsense, practical guide to current and future processor and computer architectures, enabling you to design computer systems and develop better software applications across a variety of domains Key Features Understand digital circuitry with the help of transistors, logic gates, and sequential logic Examine the architecture and instruction sets of x86, x64, ARM, and RISC-V processors Explore the architecture of modern devices such as the iPhone X and high-performance gaming PCs Book DescriptionAre you a software developer, systems designer, or computer architecture student looking for a methodical introduction to digital device architectures but overwhelmed by their complexity? This boo...

Data Engineering with Google Cloud Platform
  • Language: en
  • Pages: 440

Data Engineering with Google Cloud Platform

Build and deploy your own data pipelines on GCP, make key architectural decisions, and gain the confidence to boost your career as a data engineer Key Features Understand data engineering concepts, the role of a data engineer, and the benefits of using GCP for building your solution Learn how to use the various GCP products to ingest, consume, and transform data and orchestrate pipelines Discover tips to prepare for and pass the Professional Data Engineer exam Book DescriptionWith this book, you'll understand how the highly scalable Google Cloud Platform (GCP) enables data engineers to create end-to-end data pipelines right from storing and processing data and workflow orchestration to prese...

AWS Certified Solutions Architect Official Study Guide
  • Language: en
  • Pages: 512

AWS Certified Solutions Architect Official Study Guide

Validate your AWS skills. This is your opportunity to take the next step in your career by expanding and validating your skills on the AWS cloud. AWS has been the frontrunner in cloud computing products and services, and the AWS Certified Solutions Architect Official Study Guide for the Associate exam will get you fully prepared through expert content, and real-world knowledge, key exam essentials, chapter review questions, access to Sybex’s interactive online learning environment, and much more. This official study guide, written by AWS experts, covers exam concepts, and provides key review on exam topics, including: Mapping Multi-Tier Architectures to AWS Services, such as web/app server...

Mastering Windows Security and Hardening
  • Language: en
  • Pages: 573

Mastering Windows Security and Hardening

Enhance Windows security and protect your systems and servers from various cyber attacks Key Features Book DescriptionAre you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide that helps you gain expertise when implementing efficient security measures and creating robust defense solutions. We will begin with an introduction to Windows security fundamentals, baselining, and the importance of building a baseline for an organization. As you advance, you will learn how to effectively secure and harden your Windows-based system, protect identities, and even manage access. In the co...

Learn Kubernetes Security
  • Language: en
  • Pages: 330

Learn Kubernetes Security

Secure your container environment against cyberattacks and deliver robust deployments with this practical guide Key FeaturesExplore a variety of Kubernetes components that help you to prevent cyberattacksPerform effective resource management and monitoring with Prometheus and built-in Kubernetes toolsLearn techniques to prevent attackers from compromising applications and accessing resources for crypto-coin miningBook Description Kubernetes is an open source orchestration platform for managing containerized applications. Despite widespread adoption of the technology, DevOps engineers might be unaware of the pitfalls of containerized environments. With this comprehensive book, you'll learn ho...