Sagar et al., 2022 - Google Patents
Information security: safeguarding resources and building trustSagar et al., 2022
- Document ID
- 5671098293973491441
- Author
- Sagar G
- Syrovatskyi V
- Publication year
- Publication venue
- Technical Building Blocks: A Technology Reference for Real-world Product Development
External Links
Snippet
Security is a complex issue which is related to infrastructure, software, people, and processes. There are threats against all of these dimensions. In this chapter we will talk about security aspects of building modern applications and understand which most common …
- 238000000034 method 0 abstract description 30
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Indu et al. | Identity and access management in cloud environment: Mechanisms and challenges | |
| Lodderstedt et al. | OAuth 2.0 threat model and security considerations | |
| Lampson | Computer security in the real world | |
| CN106063219B (en) | System and method for biometric protocol standards | |
| US20230412626A1 (en) | Systems and methods for cyber security and quantum encapsulation for smart cities and the internet of things | |
| Sumitra et al. | A survey of cloud authentication attacks and solution approaches | |
| Atashzar et al. | A survey on web application vulnerabilities and countermeasures | |
| Singh et al. | OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities | |
| Tirfe et al. | A survey on trends of two-factor authentication | |
| Hindka | Securing the Digital Backbone: An In-depth Insights into API Security Patterns and Practices | |
| Chandra et al. | Authentication and authorization mechanism for cloud security | |
| Chauhan | Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus | |
| George | The dawn of passkeys: Evaluating a passwordless future | |
| Sagar et al. | Information security: safeguarding resources and building trust | |
| Sam et al. | Survey of risks and threats in online learning applications | |
| Odirichukwu et al. | Security concept in web database development and administration—A review perspective | |
| Chadwick | Threat modelling for active directory | |
| Ghorbanzadeh et al. | A survey of mobile database security threats and solutions for it | |
| WO2023150666A1 (en) | Systems and methods for securing devices in a computing environment | |
| Ali et al. | Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence | |
| Siriwardena | Security by design | |
| Temdee et al. | Security for context-aware applications | |
| Kuzminykh et al. | Mechanisms of ensuring security in Keystone service | |
| Bolgouras et al. | Enabling qualified anonymity for enhanced user privacy in the digital era | |
| Maidine et al. | Key Mechanisms and Emerging Issues in Cloud Identity Systems |