Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Keycloak - Identity and Access Management for Modern Applications
  • Language: en
  • Pages: 351

Keycloak - Identity and Access Management for Modern Applications

Gain a practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak. Purchase of the print or Kindle book includes a free PDF eBook Key Features A beginners’ guide to Keycloak focussed on understanding Identity and Access Management Implement authentication and authorization in applications using Keycloak 22 Utilize Keycloak in securing applications developed by you and the existing applications in your enterprise Book DescriptionThe second edition of Keycloak - Identity and Access Management for Modern Applications is an updated, comprehensive introduction to Keycloak and its updates. In this n...

Implementing Multifactor Authentication
  • Language: en
  • Pages: 550

Implementing Multifactor Authentication

Avoid MFA pitfalls—learn how to choose, implement, and troubleshoot MFA in your company Purchase of the print or Kindle book includes a free PDF eBook Key Features Gain proficiency in using solutions like Okta, Ping Identity, and ForgeRock within the IAM domain Thwart authentication breaches using pragmatic strategies and lessons derived from real-world scenarios Choose the right MFA solutions to enhance your organization's security Book Description In the realm of global cybersecurity, multifactor authentication (MFA) has become the key strategy; however, choosing the wrong MFA solution can do more harm than good. This book serves as a comprehensive guide, helping you choose, deploy, and ...

Decentralized Identity Explained
  • Language: en
  • Pages: 392

Decentralized Identity Explained

Delve into the cutting-edge trends of decentralized identities, blockchains, and other digital identity management technologies and leverage them to craft seamless digital experiences for both your customers and employees Key Features Explore decentralized identities and blockchain technology in depth Gain practical insights for leveraging advanced digital identity management tools, frameworks, and solutions Discover best practices for integrating decentralized identity solutions into existing systems Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionLooking forward to mastering digital identity? This book will help you get to grips with complete frameworks, tool...

Keycloak - Identity and Access Management for Modern Applications
  • Language: en
  • Pages: 362

Keycloak - Identity and Access Management for Modern Applications

Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in applications Key Features Get up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examples Configure, manage, and extend Keycloak for optimized security Leverage Keycloak features to secure different application types Book DescriptionImplementing authentication and authorization for applications can be a daunting experience, often leaving them exposed to security vulnerabilities. Keycloak is an open-source solution for identity management and access management for modern applications, which can make a world of diff...

Implementing Identity Management on AWS
  • Language: en
  • Pages: 504

Implementing Identity Management on AWS

Understand the IAM toolsets, capabilities, and paradigms of the AWS platform and learn how to apply practical identity use cases to AWS at the administrative and application level Key FeaturesLearn administrative lifecycle management and authorizationExtend workforce identity to AWS for applications deployed to Amazon Web Services (AWS)Understand how to use native AWS IAM capabilities with apps deployed to AWSBook Description AWS identity management offers a powerful yet complex array of native capabilities and connections to existing enterprise identity systems for administrative and application identity use cases. This book breaks down the complexities involved by adopting a use-case-drive...

프런트엔드 개발자를 위한 테스트 가이드
  • Language: ko
  • Pages: 270

프런트엔드 개발자를 위한 테스트 가이드

  • Type: Book
  • -
  • Published: Unknown
  • -
  • Publisher: 제이펍

테스트 자동화 프레임워크를 활용하면 효율적으로 웹 애플리케이션을 개발할 수 있다 웹 개발 기술이 끊임없이 변하는 요즘, 프런트엔드 개발자가 모든 웹 브라우저나 수많은 모바일 기기에서 버그 없이 완벽하게 실행되는 웹 애플리케이션을 개발하기는 상당히 어려운 일이다. 게다가 정해진 배포 주기 속도를 맞추며 품질의 균형까지 맞춰야 하는 환경에서 직접 웹 화면을 모두 테스트하는 것은 현실적으로 불가능에 가깝다. 이때 필요한 것이 테스트 자동화다. 테스트 자동화는 전체적인 품질을 유지하게 해주므로 소프트웨...

Explanations in Sociosyntactic Variation
  • Language: en
  • Pages: 227

Explanations in Sociosyntactic Variation

New perspectives on how and why syntax varies between and within speakers, focusing on explaining theoretical backgrounds and methods.

Pro Telerik ASP.NET and Silverlight Controls
  • Language: en
  • Pages: 686

Pro Telerik ASP.NET and Silverlight Controls

  • Type: Book
  • -
  • Published: 2010-12-28
  • -
  • Publisher: Apress

This book provides a complete guide to implementing Telerik’s range of ASP.NET and Silverlight controls. Telerik controls are invaluable for ASP.NET and Silverlight developers because they provide a vast array of rich controls targeted for the presentation layer of web applications. Telerik offers you solutions for the reports, grids, charts, and text-editing controls that you need but don’t want to build from scratch yourself—the options are endless for increasing the functionality of any of your web solutions.

Solving Identity and Access Management in Modern Applications
  • Language: en
  • Pages: 165

Solving Identity and Access Management in Modern Applications

  • Type: Book
  • -
  • Published: 2020-03-02
  • -
  • Publisher: Apress

Know how to design and use identity management to protect your application and the data it manages. At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided. Solving Identity and Access Management in Modern Applications gives you what you need to design...

Logging and Log Management
  • Language: en
  • Pages: 463

Logging and Log Management

  • Type: Book
  • -
  • Published: 2012-12-31
  • -
  • Publisher: Newnes

Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management introduces information technology professionals to the basic concepts of logging and log management. It provides tools and techniques to analyze log data and detect malicious activity. The book consists of 22 chapters that cover the basics of log data; log data sources; log storage technologies; a case study on how syslog-ng is deployed in a real environment for log collection; covert logging; planning and preparing for the analysis log data; simple analysis techniques; and tools and techniques for reviewing logs for potential problems. The book also discusses statistical ...