Domain whoisprotect.de kaufen?

Produkt zum Begriff Software:


  • Art of Software Security Testing, The: Identifying Software Security Flaws
    Art of Software Security Testing, The: Identifying Software Security Flaws

    State-of-the-Art Software Security Testing: Expert, Up to Date, and Comprehensive   The Art of Software Security Testing delivers in-depth, up-to-date, battle-tested techniques for anticipating and identifying software security problems before the “bad guys” do.   Drawing on decades of experience in application and penetration testing, this book’s authors can help you transform your approach from mere “verification” to proactive “attack.” The authors begin by systematically reviewing the design and coding vulnerabilities that can arise in software, and offering realistic guidance in avoiding them. Next, they show you ways to customize software debugging tools to test the unique aspects of any program and then analyze the results to identify exploitable vulnerabilities.   Coverage includes Tips on how to think the way software attackers think to strengthen your defense strategy Cost-effectively integrating security testing into your development lifecycle Using threat modeling to prioritize testing based on your top areas of risk Building testing labs for performing white-, grey-, and black-box software testing Choosing and using the right tools for each testing project Executing today’s leading attacks, from fault injection to buffer overflows Determining which flaws are most likely to be exploited by real-world attackers      

    Preis: 27.81 € | Versand*: 0 €
  • Domain Storytelling: A Collaborative, Visual, and Agile Way to Build Domain-Driven Software
    Domain Storytelling: A Collaborative, Visual, and Agile Way to Build Domain-Driven Software

    Build Better Business Software by Telling and Visualizing Stories"From a story to working software--this book helps you to get to the essence of what to build. Highly recommended!" --Oliver DrotbohmStorytelling is at the heart of human communication--why not use it to overcome costly misunderstandings when designing software? By telling and visualizing stories, domain experts and team members make business processes and domain knowledge tangible. Domain Storytelling enables everyone to understand the relevant people, activities, and work items. With this guide, the method's inventors explain how domain experts and teams can work together to capture insights with simple pictographs, show their work, solicit feedback, and get everyone on the same page.Stefan Hofer and Henning Schwentner introduce the method's easy pictographic language, scenario-based modeling techniques, workshop format, and relationship to other modeling methods. Using step-by-step case studies, they guide you through solving many common problems:Fully align all project participants and stakeholders, both technical and business-focusedMaster a simple set of symbols and rules for modeling any process or workflowUse workshop-based collaborative modeling to find better solutions fasterDraw clear boundaries to organize your domain, software, and teamsTransform domain knowledge into requirements, embedded naturally into an agile processMove your models from diagrams and sticky notes to codeGain better visibility into your IT landscape so you can consolidate or optimize itThis guide is for everyone who wants more effective software--from developers, architects, and team leads to the domain experts, product owners, and executives who rely on it every day.Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

    Preis: 29.95 € | Versand*: 0 €
  • Art of Software Security Assessment, The: Identifying and Preventing Software Vulnerabilities
    Art of Software Security Assessment, The: Identifying and Preventing Software Vulnerabilities

    “There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.” —Halvar Flake, CEO and head of research, SABRE Security GmbH   The Definitive Insider’s Guide to Auditing Software Security   This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are leading security consultants and researchers who have personally uncovered vulnerabilities in applications ranging from sendmail to Microsoft Exchange, Check Point VPN to Internet Explorer. Drawing on their extraordinary experience, they introduce a start-to-finish methodology for “ripping apart” applications to reveal even the most subtle and well-hidden security flaws.   The Art of Software Security Assessment covers the full spectrum of software vulnerabilities in both UNIX/Linux and Windows environments. It demonstrates how to audit security in applications of all sizes and functions, including network and Web software. Moreover, it teaches using extensive examples of real code drawn from past flaws in many of the industry's highest-profile applications.   Coverage includes   • Code auditing: theory, practice, proven methodologies, and secrets of the trade • Bridging the gap between secure software design and post-implementation review • Performing architectural assessment: design review, threat modeling, and operational review • Identifying vulnerabilities related to memory management, data types, and malformed data • UNIX/Linux assessment: privileges, files, and processes • Windows-specific issues, including objects and the filesystem • Auditing interprocess communication, synchronization, and state • Evaluating network software: IP stacks, firewalls, and common application protocols • Auditing Web applications and technologies   This book is an unprecedented resource for everyone who must deliver secure software or assure the safety of existing software: consultants, security specialists, developers, QA staff, testers, and administrators alike.   Contents ABOUT THE AUTHORS     xv PREFACE     xvii ACKNOWLEDGMENTS    xxi I Introduction to Software Security Assessment 1 SOFTWARE VULNERABILITY FUNDAMENTALS    3 2 DESIGN REVIEW     25 3 OPERATIONAL REVIEW    67 4 APPLICATION REVIEW PROCESS    91 II Software Vulnerabilities 5 MEMORY CORRUPTION    167 6 C LANGUAGE ISSUES     203 7 PROGRAM BUILDING BLOCKS     297 8 STRINGS ANDMETACHARACTERS    387 9 UNIX I: PRIVILEGES AND FILES     459 10 UNIX II: PROCESSES     559 11 WINDOWS I: OBJECTS AND THE FILE SYSTEM     625 12 WINDOWS II: INTERPROCESS COMMUNICATION     685 13 SYNCHRONIZATION AND STATE    755 III Software Vulnerabilities in Practice 14 NETWORK PROTOCOLS    829 15 FIREWALLS    891 16 NETWORK APPLICATION PROTOCOLS    921 17 WEB APPLICATIONS    1007 18 WEB TECHNOLOGIES     1083 BIBLIOGRAPHY     1125 INDEX     1129

    Preis: 48.14 € | Versand*: 0 €
  • ASHAMPOO Privacy Inspector 2 Software
    ASHAMPOO Privacy Inspector 2 Software

    Verwendete Objekte übersichtlich anzeigen / Surfverhalten aller Nutzer eines PCs analysieren / Seitenaufrufe nach Häufigkeit anzeigen lassen / Internet-Spuren und Nutzungsprotokolle löschen / Privatsphäre sichern und private Daten schützen

    Preis: 40.00 € | Versand*: 0.00 €
  • Welche CAD Software?

    Welche CAD Software verwenden Sie derzeit für Ihre Projekte? Es gibt eine Vielzahl von CAD-Programmen auf dem Markt, die unterschiedliche Funktionen und Anwendungsbereiche abdecken. Möglicherweise haben Sie spezifische Anforderungen an die Software, die Sie nutzen, wie zum Beispiel 2D- oder 3D-Modellierung, parametrisches Design oder spezielle Branchenlösungen. Indem Sie mir mehr über Ihre aktuelle CAD-Software erzählen, kann ich Ihnen möglicherweise besser bei Fragen oder Problemen in diesem Bereich helfen.

  • Was ist SAP-Software?

    SAP-Software ist eine Unternehmenssoftware, die von der Firma SAP SE entwickelt wurde. Sie dient dazu, verschiedene Geschäftsprozesse in Unternehmen zu optimieren und zu vereinfachen. Die Software umfasst Module für Bereiche wie Finanzwesen, Personalwesen, Beschaffung, Vertrieb und Produktion. SAP-Software wird von vielen Unternehmen weltweit eingesetzt, um ihre Abläufe effizienter zu gestalten und ihre Daten zentral zu verwalten.

  • Welche Software hat Huawei?

    Welche Software hat Huawei? Huawei entwickelt und verwendet eine Vielzahl von Softwarelösungen für ihre Produkte, darunter das Betriebssystem HarmonyOS, das als Alternative zu Android entwickelt wurde. Darüber hinaus bietet Huawei auch eine Reihe von Anwendungen und Diensten an, die auf ihren Geräten vorinstalliert sind, wie z.B. die AppGallery für den Download von Apps. Zudem arbeitet Huawei an verschiedenen Softwarelösungen im Bereich der künstlichen Intelligenz, Cloud-Services und Cybersicherheit. Insgesamt verfügt Huawei über ein breites Portfolio an Software, das sowohl für ihre eigenen Produkte als auch für externe Kunden entwickelt wird.

  • Was sind die Vorteile von Open-Source-Software gegenüber proprietärer Software?

    Die Vorteile von Open-Source-Software sind, dass sie in der Regel kostenlos ist, flexibler und anpassbarer als proprietäre Software und von einer großen Community unterstützt wird, die regelmäßig Updates und Fehlerbehebungen bereitstellt.

Ähnliche Suchbegriffe für Software:


  • McAfee Privacy & Identity Guard Software
    McAfee Privacy & Identity Guard Software

    Preisgekrönte Sicherheit / Schutz für Ihre persönlichen Daten im Internet / Bereinigung von Online-Konten (Scans) / 1 Jahres Abonnement

    Preis: 28.13 € | Versand*: 0.00 €
  • Domain-Driven Design: Tackling Complexity in the Heart of Software
    Domain-Driven Design: Tackling Complexity in the Heart of Software

    Incorporate effective domain modeling into the software development processSoftware design thought leader and founder of Domain Language, Eric Evans, provides a systematic approach to domain-driven design, presenting an extensive set of design best practices, experience-based techniques, and fundamental principles that facilitate the development of software projects facing complex domains. Intertwining system design and development practice, this book incorporates numerous examples based on actual projects to illustrate the application of domain-driven design to real-world software modeling and development.Domain Model: Part I outlines the goals of domain-driven development, defines terms, and gives an overview of the implications of using the domain model to drive communication and designModel-Driven Design: Part II condenses a core of best practices in object-oriented domain modeling into a set of basic building blocks and focuses on the kinds of decisions that keep the model and implementation aligned with each other, each reinforcing the other’s effectivenessRefactoring: Part III delves into modeling principles that can guide choices along the way, and techniques that help direct the searchStrategic Design: Part IV explores a triad of principles that apply to the system as a whole: context, distillation, and large-scale structure Throughout the book, discussions are illustrated not with over-simplified, “” problems, but with realistic examples adapted from actual projects. With this book in hand, object-oriented developers, system analysts, and designers will have the guidance they need to organize and focus their work, create rich and useful domain models, and leverage those models into quality, long-lasting software implementations. “The book is a fun read. Eric has lots of interesting stories, and he has a way with words. I see this book as essential reading for software developers—it is a future classic.”—Ralph Johnson, author of Design Patterns

    Preis: 68.47 € | Versand*: 0 €
  • Enterprise Software Security: A Confluence of Disciplines
    Enterprise Software Security: A Confluence of Disciplines

    STRENGTHEN SOFTWARE SECURITY BY HELPING DEVELOPERS AND SECURITY EXPERTS WORK TOGETHER   Traditional approaches to securing software are inadequate. The solution: Bring software engineering and network security teams together in a new, holistic approach to protecting the entire enterprise. Now, four highly respected security experts explain why this “confluence” is so crucial, and show how to implement it in your organization.   Writing for all software and security practitioners and leaders, they show how software can play a vital, active role in protecting your organization. You’ll learn how to construct software that actively safeguards sensitive data and business processes and contributes to intrusion detection/response in sophisticated new ways. The authors cover the entire development lifecycle, including project inception, design, implementation, testing, deployment, operation, and maintenance. They also provide a full chapter of advice specifically for Chief Information Security Officers and other enterprise security executives. Whatever your software security responsibilities, Enterprise Software Security delivers indispensable big-picture guidance–and specific, high-value recommendations you can apply right now.   COVERAGE INCLUDES: • Overcoming common obstacles to collaboration between developers and IT security professionals• Helping programmers design, write, deploy, and operate more secure software• Helping network security engineers use application output more effectively• Organizing a software security team before you’ve even created requirements• Avoiding the unmanageable complexity and inherent flaws of layered security• Implementing positive software design practices and identifying security defects in existing designs• Teaming to improve code reviews, clarify attack scenarios associated with vulnerable code, and validate positive compliance• Moving beyond pentesting toward more comprehensive security testing• Integrating your new application with your existing security infrastructure• “Ruggedizing” DevOps by adding infosec to the relationship between development and operations• Protecting application security during maintenance

    Preis: 27.81 € | Versand*: 0 €
  • Domain Storytelling: A Collaborative, Visual, and Agile Way to Build Domain-Driven Software
    Domain Storytelling: A Collaborative, Visual, and Agile Way to Build Domain-Driven Software

    Build Better Business Software by Telling and Visualizing Stories"From a story to working software--this book helps you to get to the essence of what to build. Highly recommended!" --Oliver DrotbohmStorytelling is at the heart of human communication--why not use it to overcome costly misunderstandings when designing software? By telling and visualizing stories, domain experts and team members make business processes and domain knowledge tangible. Domain Storytelling enables everyone to understand the relevant people, activities, and work items. With this guide, the method's inventors explain how domain experts and teams can work together to capture insights with simple pictographs, show their work, solicit feedback, and get everyone on the same page.Stefan Hofer and Henning Schwentner introduce the method's easy pictographic language, scenario-based modeling techniques, workshop format, and relationship to other modeling methods. Using step-by-step case studies, they guide you through solving many common problems:Fully align all project participants and stakeholders, both technical and business-focusedMaster a simple set of symbols and rules for modeling any process or workflowUse workshop-based collaborative modeling to find better solutions fasterDraw clear boundaries to organize your domain, software, and teamsTransform domain knowledge into requirements, embedded naturally into an agile processMove your models from diagrams and sticky notes to codeGain better visibility into your IT landscape so you can consolidate or optimize itThis guide is for everyone who wants more effective software--from developers, architects, and team leads to the domain experts, product owners, and executives who rely on it every day.Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

    Preis: 37.44 € | Versand*: 0 €
  • Was sind die Vorteile von Open-Source-Software gegenüber proprietärer Software?

    Open-Source-Software ist in der Regel kostenlos verfügbar, was Kosten spart. Sie bietet mehr Flexibilität und Anpassungsmöglichkeiten, da der Quellcode offen ist. Zudem fördert sie die Zusammenarbeit und Innovation durch die Beteiligung einer breiten Community.

  • Was sind die grundlegenden Unterschiede zwischen Open-Source-Software und proprietärer Software?

    Open-Source-Software ist frei verfügbar, kann von jedem eingesehen, modifiziert und weitergegeben werden. Proprietäre Software ist geschützt durch Urheberrechte und kann nicht frei modifiziert oder weitergegeben werden. Open-Source-Software fördert die Zusammenarbeit und Transparenz, während proprietäre Software oft kostenpflichtig ist und weniger Flexibilität bietet.

  • Was macht die Software?

    Was macht die Software? Die Software ist ein Programm, das spezifische Aufgaben auf einem Computer ausführt. Sie kann verschiedene Funktionen haben, wie z.B. Daten verarbeiten, Berechnungen durchführen, Dateien organisieren oder Benutzerinteraktion ermöglichen. Die Software kann sowohl für den privaten als auch für den geschäftlichen Gebrauch entwickelt werden und wird in verschiedenen Branchen eingesetzt. Letztendlich dient die Software dazu, die Effizienz und Produktivität von Benutzern zu verbessern und komplexe Aufgaben zu automatisieren.

  • Was ist Software-Dokumentation?

    Software-Dokumentation ist ein wichtiger Bestandteil der Softwareentwicklung und bezieht sich auf alle schriftlichen Informationen, die den Entwicklungsprozess, die Funktionalitäten und die Verwendung einer Software beschreiben. Diese Dokumentation kann Benutzerhandbücher, Installationsanleitungen, technische Spezifikationen, Code-Kommentare und andere schriftliche Materialien umfassen. Sie dient dazu, Entwicklern, Benutzern und anderen Interessengruppen einen Leitfaden zur Verfügung zu stellen, um die Software effektiv zu verstehen, zu nutzen und zu warten. Eine gute Software-Dokumentation trägt dazu bei, die Effizienz der Entwicklungsteams zu steigern und die Benutzerzufriedenheit zu verbessern.

* Alle Preise verstehen sich inklusive der gesetzlichen Mehrwertsteuer und ggf. zuzüglich Versandkosten. Die Angebotsinformationen basieren auf den Angaben des jeweiligen Shops und werden über automatisierte Prozesse aktualisiert. Eine Aktualisierung in Echtzeit findet nicht statt, so dass es im Einzelfall zu Abweichungen kommen kann.