Anbieter: medimops, Berlin, Deutschland
EUR 8,18
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: very good. Gut/Very good: Buch bzw. Schutzumschlag mit wenigen Gebrauchsspuren an Einband, Schutzumschlag oder Seiten. / Describes a book or dust jacket that does show some signs of wear on either the binding, dust jacket or pages.
Anbieter: WeBuyBooks, Rossendale, LANCS, Vereinigtes Königreich
EUR 5,72
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: Very Good. Most items will be dispatched the same or the next working day. A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
EUR 31,72
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbPAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000.
EUR 33,11
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbZustand: New. With this practical guide, you ll learn how and why everyone working on a system needs to ensure that users and data are protected. The authors provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure inte.
Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
EUR 31,65
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbPAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000.
Anbieter: THE SAINT BOOKSTORE, Southport, Vereinigtes Königreich
EUR 31,05
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbPaperback / softback. Zustand: New. New copy - Usually dispatched within 4 working days. 393.
Anbieter: Rarewaves.com UK, London, Vereinigtes Königreich
EUR 37,99
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: New. Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected. Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity-without compromising usability. You'll learn how to plug holes in existing systems, protect against viable attack vectors, and work in environments that sometimes are naturally insecure.Understand the state of web and application security today Design security password encryption, and combat password attack vectors Create digital fingerprints to identify users through browser, device, and paired device detection Build secure data transmission systems through OAuth and OpenID Connect Use alternate methods of identification for a second factor of authentication Harden your web applications against attack Create a secure data transmission system using SSL/TLS, and synchronous and asynchronous cryptography.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 39,59
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Neuware - Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected.
Anbieter: Rarewaves.com USA, London, LONDO, Vereinigtes Königreich
EUR 42,15
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: New. Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected. Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity-without compromising usability. You'll learn how to plug holes in existing systems, protect against viable attack vectors, and work in environments that sometimes are naturally insecure.Understand the state of web and application security today Design security password encryption, and combat password attack vectors Create digital fingerprints to identify users through browser, device, and paired device detection Build secure data transmission systems through OAuth and OpenID Connect Use alternate methods of identification for a second factor of authentication Harden your web applications against attack Create a secure data transmission system using SSL/TLS, and synchronous and asynchronous cryptography.
Anbieter: GreatBookPrices, Columbia, MD, USA
EUR 27,10
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbZustand: As New. Unread book in perfect condition.
EUR 42,08
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbPaperback. Zustand: New. Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected. Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity-without compromising usability. You'll learn how to plug holes in existing systems, protect against viable attack vectors, and work in environments that sometimes are naturally insecure.Understand the state of web and application security today Design security password encryption, and combat password attack vectors Create digital fingerprints to identify users through browser, device, and paired device detection Build secure data transmission systems through OAuth and OpenID Connect Use alternate methods of identification for a second factor of authentication Harden your web applications against attack Create a secure data transmission system using SSL/TLS, and synchronous and asynchronous cryptography.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 40,65
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: GreatBookPrices, Columbia, MD, USA
EUR 29,33
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbZustand: New.
EUR 43,33
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbPaperback. Zustand: New. Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected. Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity-without compromising usability. You'll learn how to plug holes in existing systems, protect against viable attack vectors, and work in environments that sometimes are naturally insecure.Understand the state of web and application security today Design security password encryption, and combat password attack vectors Create digital fingerprints to identify users through browser, device, and paired device detection Build secure data transmission systems through OAuth and OpenID Connect Use alternate methods of identification for a second factor of authentication Harden your web applications against attack Create a secure data transmission system using SSL/TLS, and synchronous and asynchronous cryptography.
Anbieter: SecondSale, Montgomery, IL, USA
EUR 17,78
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc.
Anbieter: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irland
Erstausgabe
EUR 45,96
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: New. With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected. The authors provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity-without compromising usability. Num Pages: 204 pages, black & white illustrations. BIC Classification: UMW; UR. Category: (XV) Technical / Manuals. Dimension: 179 x 234 x 14. Weight in Grams: 366. . 2016. 1st Edition. Paperback. . . . .
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 31,04
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbZustand: New.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 32,11
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbZustand: As New. Unread book in perfect condition.
Anbieter: BargainBookStores, Grand Rapids, MI, USA
EUR 40,39
Währung umrechnenAnzahl: 5 verfügbar
In den WarenkorbPaperback or Softback. Zustand: New. Identity and Data Security for Web Development: Best Practices 0.73. Book.
Anbieter: California Books, Miami, FL, USA
EUR 43,28
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
EUR 56,49
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: New. With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected. The authors provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity-without compromising usability. Num Pages: 204 pages, black & white illustrations. BIC Classification: UMW; UR. Category: (XV) Technical / Manuals. Dimension: 179 x 234 x 14. Weight in Grams: 366. . 2016. 1st Edition. Paperback. . . . . Books ship from the US and Ireland.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 55,29
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 1st edition. 188 pages. 9.25x7.00x0.50 inches. In Stock.
Anbieter: Magus Books Seattle, Seattle, WA, USA
EUR 23,26
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTrade Paperback. Zustand: VG. used trade paperback edition. lightly shelfworn, corners perhaps slightly bumped. pages and binding are clean, straight and tight. there are no marks to the text or other serious flaws.
Anbieter: HPB-Diamond, Dallas, TX, USA
EUR 14,42
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Very Good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority!
ISBN 10: 7519814203 ISBN 13: 9787519814205
Anbieter: liu xing, Nanjing, JS, China
EUR 77,55
Währung umrechnenAnzahl: 5 verfügbar
In den Warenkorbpaperback. Zustand: New. Language:Chinese.Paperback. Pub Date: 2018-01-01 Pages: 204 Publisher: China power press this book discussed the building interface to protect the safety of data and status to grasp the concepts. techniques and programming methodology. and availability.You will learn how to make up for the existing system vulnerabilities. defend against various media. and how to protection of the natural environment from the.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 44,16
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 1st edition. 188 pages. 9.25x7.00x0.50 inches. In Stock. This item is printed on demand.