Star Trek: Security

Star Trek: Security
Author: Keith R. A. DeCandido
Publisher: Simon and Schuster
Total Pages: 136
Release: 2005-08-01
Genre: Fiction
ISBN: 1416510915

Starfleet Corps of Engineers When a new security guard reports for duty, it sets da Vinci security chief Domenica Corsi off in ways that confuse both her staff and her sometime lover Fabian Stevens. When Stevens confronts her, it only makes matters worse -- until Corsi takes Stevens into her confidence ... Ten years ago, Corsi served on the U.S.S. Roosevelt. On a trip to the Federation world of Izar, Corsi was assigned to work with a local peace officer named Christine Vale to try to solve a multiple homicide. But the trail of evidence leads down a road Corsi refuses to take -- a decision that will have tragic consequences for the young officer.

Cloud Security and Privacy

Cloud Security and Privacy
Author: Tim Mather
Publisher: "O'Reilly Media, Inc."
Total Pages: 338
Release: 2009-09-04
Genre: Computers
ISBN: 1449379516

You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn detailed information on cloud computing security that-until now-has been sorely lacking. Review the current state of data security and storage in the cloud, including confidentiality, integrity, and availability Learn about the identity and access management (IAM) practice for authentication, authorization, and auditing of the users accessing cloud services Discover which security management frameworks and standards are relevant for the cloud Understand the privacy aspects you need to consider in the cloud, including how they compare with traditional computing models Learn the importance of audit and compliance functions within the cloud, and the various standards and frameworks to consider Examine security delivered as a service-a different facet of cloud security

Legends of the Ferengi

Legends of the Ferengi
Author: Ira Steven Behr
Publisher: Simon and Schuster
Total Pages: 161
Release: 1997-08-01
Genre: Fiction
ISBN: 0743420799

A collection of the guiding principles of the galaxy's most successful entrepreneurs, using coveted Ferengi wisdom and recounting legendary tales of profit. For centuries the famous Ferengi "Rules of Acquisition" have been the guiding principles of the galaxy's most successful entrepreneurs. But the wisdom behind them was not won without a high cost in lives and latnium. Now at last these inspiring tales of avaricious Ferengi wresting monetary gain from the jaws of poverty are available to the profit-hungry across the galaxy!

A Planet for Rent

A Planet for Rent
Author: Yoss
Publisher: Restless Books
Total Pages: 641
Release: 2014-09-30
Genre: Fiction
ISBN: 1632060086

The most successful and controversial Cuban Science Fiction writer of all time, Yoss (aka José Miguel Sánchez Gómez) is known for his acerbic portraits of the island under Communism. In his bestselling A Planet for Rent, Yoss pays homage to Ray Bradbury’s The Martian Chronicles and 334 by Thomas M. Disch. A critique of Cuba in the nineties, after the fall of the Soviet Union and the dissolution of the Warsaw Pact, A Planet for Rent marks the debut in English of an astonishingly brave and imaginative Latin American voice. Praise for Yoss “One of the most prestigious science fiction authors of the island.” —On Cuba Magazine "A gifted and daring writer." —David Iaconangelo "José Miguel Sánchez [Yoss] is Cuba’s most decorated science fiction author, who has cultivated the most prestige for this genre in the mainstream, and the only person of all the Island’s residents who lives by his pen.” —Cuenta Regresiva Born José Miguel Sánchez Gómez, Yoss assumed his pen name in 1988, when he won the Premio David Award in the science fiction category for Timshel. Together with his peculiar pseudonym, the author's aesthetic of an impentinent rocker has allowed him to stand out amongst his fellow Cuban writers. Earning a degree in Biology in 1991, he went on to graduate from the first ever course on Narrative Techniques at the Onelio Jorge Cardoso Center of Literary Training, in the year 1999. Today, Yoss writes both realistic and science fiction works. Alongside these novels, the author produces essays, Praise for, and compilations, and actively promotes the Cuban science fiction literary workshops, Espiral and Espacio Abierto. When he isn’t translating, David Frye teaches Latin American culture and society at the University of Michigan. Translations include First New Chronicle and Good Government by Guaman Poma de Ayala (Peru, 1615); The Mangy Parrot by José Joaquín Fernandez de Lizardi (Mexico, 1816), for which he received a National Endowment for the Arts Fellowship; Writing across Cultures: Narrative Transculturation in Latin America by Ángel Rama (Uruguay, 1982), and several Cuban and Spanish novels and poems.

Full Stack Python Security

Full Stack Python Security
Author: Dennis Byrne
Publisher: Simon and Schuster
Total Pages: 495
Release: 2021-08-24
Genre: Computers
ISBN: 1638357161

Full Stack Python Security teaches you everything you’ll need to build secure Python web applications. Summary In Full Stack Python Security: Cryptography, TLS, and attack resistance, you’ll learn how to: Use algorithms to encrypt, hash, and digitally sign data Create and install TLS certificates Implement authentication, authorization, OAuth 2.0, and form validation in Django Protect a web application with Content Security Policy Implement Cross Origin Resource Sharing Protect against common attacks including clickjacking, denial of service attacks, SQL injection, cross-site scripting, and more Full Stack Python Security: Cryptography, TLS, and attack resistance teaches you everything you’ll need to build secure Python web applications. As you work through the insightful code snippets and engaging examples, you’ll put security standards, best practices, and more into action. Along the way, you’ll get exposure to important libraries and tools in the Python ecosystem. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology Security is a full-stack concern, encompassing user interfaces, APIs, web servers, network infrastructure, and everything in between. Master the powerful libraries, frameworks, and tools in the Python ecosystem and you can protect your systems top to bottom. Packed with realistic examples, lucid illustrations, and working code, this book shows you exactly how to secure Python-based web applications. About the book Full Stack Python Security: Cryptography, TLS, and attack resistance teaches you everything you need to secure Python and Django-based web apps. In it, seasoned security pro Dennis Byrne demystifies complex security terms and algorithms. Starting with a clear review of cryptographic foundations, you’ll learn how to implement layers of defense, secure user authentication and third-party access, and protect your applications against common hacks. What's inside Encrypt, hash, and digitally sign data Create and install TLS certificates Implement authentication, authorization, OAuth 2.0, and form validation in Django Protect against attacks such as clickjacking, cross-site scripting, and SQL injection About the reader For intermediate Python programmers. About the author Dennis Byrne is a tech lead for 23andMe, where he protects the genetic data of more than 10 million customers. Table of Contents 1 Defense in depth PART 1 - CRYPTOGRAPHIC FOUNDATIONS 2 Hashing 3 Keyed hashing 4 Symmetric encryption 5 Asymmetric encryption 6 Transport Layer Security PART 2 - AUTHENTICATION AND AUTHORIZATION 7 HTTP session management 8 User authentication 9 User password management 10 Authorization 11 OAuth 2 PART 3 - ATTACK RESISTANCE 12 Working with the operating system 13 Never trust input 14 Cross-site scripting attacks 15 Content Security Policy 16 Cross-site request forgery 17 Cross-Origin Resource Sharing 18 Clickjacking

The Mom Friend Guide to Everyday Safety and Security

The Mom Friend Guide to Everyday Safety and Security
Author: Cathy Pedrayes
Publisher: Simon and Schuster
Total Pages: 224
Release: 2022-04-12
Genre: Self-Help
ISBN: 1982185686

Prepare yourself for whatever life throws your way with these essential safety and security hacks you need to know to keep you and your family safe, from TikTok’s Mom Friend, Cathy Pedrayes. Have you ever wished that you kept a first-aid kit in the car or berated yourself for not keeping a pair of flip-flops in your purse at all times? Ever wondered when it’s okay to geo-tag a social media post or when it’s best to lie to strangers? Just need some tips on how to feel safer and more prepared in today’s digital world? Well, Cathy Pedrayes has you covered. Known as the Mom Friend of TikTok, Cathy posts practical, everyday safety and security tips that everyone should know and incorporate into their routine. The Mom Friend Guide to Everyday Safety and Security offers a shortcut to a lifetime of tips and hacks Cathy has learned from experience as well as her consultations with personal security experts. You will find quick guides on: -Securing your home -Building a first-aid kit -Items to take with you on the go -Things to always pack when going on vacation -How to read the red flags in everyday situations -How to protect yourself online -And more! Practical and personable, The Mom Friend Guide to Everyday Safety and Security is a quick guide to all the safety tips you wish someone had told you sooner so you can be better prepared for whatever life throws your way.

Microservices Security in Action

Microservices Security in Action
Author: Wajjakkara Kankanamge Anthony Nuwan Dias
Publisher: Simon and Schuster
Total Pages: 614
Release: 2020-07-11
Genre: Computers
ISBN: 1638350116

”A complete guide to the challenges and solutions in securing microservices architectures.” —Massimo Siani, FinDynamic Key Features Secure microservices infrastructure and code Monitoring, access control, and microservice-to-microservice communications Deploy securely using Kubernetes, Docker, and the Istio service mesh. Hands-on examples and exercises using Java and Spring Boot Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. Microservices Security in Action teaches you how to address microservices-specific security challenges throughout the system. This practical guide includes plentiful hands-on exercises using industry-leading open-source tools and examples using Java and Spring Boot. About The Book Design and implement security into your microservices from the start. Microservices Security in Action teaches you to assess and address security challenges at every level of a Microservices application, from APIs to infrastructure. You’ll find effective solutions to common security problems, including throttling and monitoring, access control at the API gateway, and microservice-to-microservice communication. Detailed Java code samples, exercises, and real-world business use cases ensure you can put what you’ve learned into action immediately. What You Will Learn Microservice security concepts Edge services with an API gateway Deployments with Docker, Kubernetes, and Istio Security testing at the code level Communications with HTTP, gRPC, and Kafka This Book Is Written For For experienced microservices developers with intermediate Java skills. About The Author Prabath Siriwardena is the vice president of security architecture at WSO2. Nuwan Dias is the director of API architecture at WSO2. They have designed secure systems for many Fortune 500 companies. Table of Contents PART 1 OVERVIEW 1 Microservices security landscape 2 First steps in securing microservices PART 2 EDGE SECURITY 3 Securing north/south traffic with an API gateway 4 Accessing a secured microservice via a single-page application 5 Engaging throttling, monitoring, and access control PART 3 SERVICE-TO-SERVICE COMMUNICATIONS 6 Securing east/west traffic with certificates 7 Securing east/west traffic with JWT 8 Securing east/west traffic over gRPC 9 Securing reactive microservices PART 4 SECURE DEPLOYMENT 10 Conquering container security with Docker 11 Securing microservices on Kubernetes 12 Securing microservices with Istio service mesh PART 5 SECURE DEVELOPMENT 13 Secure coding practices and automation

The National Security Enterprise

The National Security Enterprise
Author: Roger Z. George
Publisher: Georgetown University Press
Total Pages: 441
Release: 2017-07-01
Genre: Political Science
ISBN: 162616441X

This second edition of The National Security Enterprise provides practitioners’ insights into the operation, missions, and organizational cultures of the principal national security agencies and other institutions that shape the US national security decision-making process. Unlike some textbooks on American foreign policy, it offers analysis from insiders who have worked at the National Security Council, the State and Defense Departments, the intelligence community, and the other critical government entities. The book explains how organizational missions and cultures create the labyrinth in which a coherent national security policy must be fashioned. Understanding and appreciating these organizations and their cultures is essential for formulating and implementing it. Taking into account the changes introduced by the Obama administration, the second edition includes four new or entirely revised chapters (Congress, Department of Homeland Security, Treasury, and USAID) and updates to the text throughout. It covers changes instituted since the first edition was published in 2011, implications of the government campaign to prosecute leaks, and lessons learned from more than a decade of war in Afghanistan and Iraq. This up-to-date book will appeal to students of US national security and foreign policy as well as career policymakers.

Star Trek Visions of Law and Justice

Star Trek Visions of Law and Justice
Author: Robert H. Chaires
Publisher: University of North Texas Press
Total Pages: 300
Release: 2003
Genre: Law
ISBN: 9780966808025

Star Trek Visions of Law and Justice collects fourteen articles connecting popular media with academic inquiry, illustrating the connections between the future world of Star Trek and current issues in international law, law and justice, and the American legal system. It makes an ideal text to teach students interdisciplinary academic concepts using a familiar, popular media phenomenon.

A Star Trek: The Next Generation: Time #9: A Time for War, A Time for Peace

A Star Trek: The Next Generation: Time #9: A Time for War, A Time for Peace
Author: Keith R. A. DeCandido
Publisher: Simon and Schuster
Total Pages: 356
Release: 2004-10-01
Genre: Fiction
ISBN: 0743499972

The shattering conclusion to the nine-book Next Generation series that chronicles the untold adventures of the Enterprise crew between the events depicted in the feature films Star Trek: Insurrection and Star Trek Nemesis! On the cusp of their epic battle with Shinzon, many of Captain Jean-Luc Picard's long-time crew were heading for new assignments and new challenges. Among the changes were William Riker's promotion to captain and his new command, Riker's marriage to Counselor Deanna Troi, and Dr. Beverly Crusher's new career at Starfleet Medical. But the story of what set them on a path away from the Starship Enterprise™ has never been told. UNTIL NOW. Following the scandalous Tezwa affair, the Federation president's resignation forces an election, with the future of the United Federation of Planets to be determined by who emerges victorious from a hotly contested vote. But it is the fate of the entire galaxy that may actually be decided on Qo'noS, as the Federation embassy is seized by terrorists whose actions expose intrigue reaching the highest levels of Klingon government—and it will take all of Ambassador Worf's skills to keep the fragile Federation-Klingon alliance from collapsing. And while this potential intergalactic chaos looms, Commander Riker finds his plans for command and marriage soured by a brutal, high-level inspection of the ship from which the crew may not escape unscathed... The epic miniseries comes to a shocking conclusion—one that will leave the Star Trek universe changed forever!