+

Sagar et al., 2022 - Google Patents

Information security: safeguarding resources and building trust

Sagar et al., 2022

Document ID
5671098293973491441
Author
Sagar G
Syrovatskyi V
Publication year
Publication venue
Technical Building Blocks: A Technology Reference for Real-world Product Development

External Links

Snippet

Security is a complex issue which is related to infrastructure, software, people, and processes. There are threats against all of these dimensions. In this chapter we will talk about security aspects of building modern applications and understand which most common …
Continue reading at link.springer.com (other versions)

Similar Documents

Publication Publication Date Title
Indu et al. Identity and access management in cloud environment: Mechanisms and challenges
Lodderstedt et al. OAuth 2.0 threat model and security considerations
Lampson Computer security in the real world
CN106063219B (en) System and method for biometric protocol standards
US20230412626A1 (en) Systems and methods for cyber security and quantum encapsulation for smart cities and the internet of things
Sumitra et al. A survey of cloud authentication attacks and solution approaches
Atashzar et al. A survey on web application vulnerabilities and countermeasures
Singh et al. OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities
Tirfe et al. A survey on trends of two-factor authentication
Hindka Securing the Digital Backbone: An In-depth Insights into API Security Patterns and Practices
Chandra et al. Authentication and authorization mechanism for cloud security
Chauhan Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus
George The dawn of passkeys: Evaluating a passwordless future
Sagar et al. Information security: safeguarding resources and building trust
Sam et al. Survey of risks and threats in online learning applications
Odirichukwu et al. Security concept in web database development and administration—A review perspective
Chadwick Threat modelling for active directory
Ghorbanzadeh et al. A survey of mobile database security threats and solutions for it
WO2023150666A1 (en) Systems and methods for securing devices in a computing environment
Ali et al. Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence
Siriwardena Security by design
Temdee et al. Security for context-aware applications
Kuzminykh et al. Mechanisms of ensuring security in Keystone service
Bolgouras et al. Enabling qualified anonymity for enhanced user privacy in the digital era
Maidine et al. Key Mechanisms and Emerging Issues in Cloud Identity Systems
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载