Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

Bücher von Michael Howard

Filter
Filter
Ordnen nachSortieren Beliebt
  • von Michael Howard
    59,90 €

    Sichere Anwendungen und Workloads in der Cloud praktisches Tutorial und hilfreiches Referenzwerk in einem behandelt die Azure-Sicherheitsdienste sowohl auf Anwendungs- als auch auf Netzwerkebene sowie deren Zusammenarbeit inkl. kostenloser Code-Beispiele zum Download Wenn wichtige Anwendungen und Workloads eines Unternehmens in die Microsoft Azure-Cloud verlagert werden, müssen sie gegen eine Vielzahl von ebenso unterschiedlichen wie gefährlichen Bedrohungen gewappnet werden. Um ihre Sicherheit zu optimieren, ist es erforderlich, dass Sie diese bereits zuverlässig in Ihre Entwürfe einbauen, bewährte Best Practices über die gesamte Entwicklung hinweg anwenden und verschiedene Azure-Dienste kombinieren. In diesem Buch zeigen Ihnen drei führende Azure-Sicherheitsexperten, wie Sie genau das tun. Auf der Grundlage ihrer umfangreichen Erfahrungen mit der Absicherung von Azure-Workloads geben die Autoren Ihnen eine praktische Anleitung zur Bewältigung unmittelbarer Sicherheitsherausforderungen an die Hand sowie eine umfassende Referenz, auf die Sie sich über Jahre hinweg verlassen können. Egal ob Softwarearchitektin, Softwareentwickler oder beim Testen: Integrieren Sie die wichtigsten Azure-Sicherheitstechnologien - von Entwurf und Entwicklung über Tests und Bereitstellung bis hin zu Governance und Compliance. In diesem Buch werden folgende Themen behandelt: Verbesserung der Anwendungs-/Workload-Sicherheit, Verringerung der Angriffsflächen und Implementierung von Zero Trust im Cloud-Code Anwendung von Sicherheitsmustern zur einfacheren Lösung gängiger Probleme Frühzeitige Modellierung von Bedrohungen, um wirksame Abhilfemaßnahmen zu planen Implementierung moderner Identitätslösungen mit OpenID Connect und OAuth2 Azure-Monitoring, Protokollierung und Kusto-Abfragen optimal nutzen Absicherung von Workloads mit den Best Practices von Azure Security Benchmark (ASB) Prinzipien für sicheren Code, defensiven Code schreiben, unsicheren Code reparieren und Codesicherheit testen Nutzung von Azure-Kryptographie und Technologien für verschlüsselte Datenverarbeitung Verstehen von Compliance- und Risikoprogrammen Sichere automatisierte CI/CD-Workflows und -Pipelines Verstärkung der Container- und Netzwerksicherheit

  • von Michael Howard
    25,00 €

    A volume in the British Government's Official History of Intelligence in the Second World War, the book has been written by a master historian renowned for his eloquence as well as for his learning.The success of these operations can be measured by the fact that by 1943 the Germans were almost wholly dependent on double agents for news of what was going on in the United Kingdom; intercepted and decrypted radio traffic showed the Allies how extensively the enemy was accepting disinformation and acting on it. In Britain, extremely tight communications security made possible the apprehension and control of virtually all active enemy agents.Sir Michael Howard explains how the British were able to deceive the Germans about the strategic intentions of the Allies and make them greatly overestimate Allied resources. Here is the most authoritative account available of such classic deception operations as Operation Mincemeat, which preceded the invasion of Sicily; the nonexistent U.S. Army group that pinned down an entire German Army in the Pas de Calais until Montgomery's forces had achieved a secure foothold in Normandy; and the amazing trick played on the German intelligence authorities by the great double agent Garbo.

  • von Michael Howard
    36,00 €

    Plan, build, and maintain highly secure Azure applications and workloads As business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across the entire development lifecycle, and combine multiple Azure services to optimize security. Now, a team of leading Azure security experts shows how to do just that. Drawing on extensive experience securing Azure workloads, the authors present a practical tutorial for addressing immediate security challenges, and a definitive design reference to rely on for years. Learn how to make the most of the platform by integrating multiple Azure security technologies at the application and network layers taking you from design and development to testing, deployment, governance, and compliance.About YouThis book is for all Azure application designers, architects, developers, development managers, testers, and everyone who wants to make sure their cloud designs and code are as secure as possible.Discover powerful new ways to:Improve app / workload security, reduce attack surfaces, and implement zero trust in cloud codeApply security patterns to solve common problems more easilyModel threats early, to plan effective mitigationsImplement modern identity solutions with OpenID Connect and OAuth2Make the most of Azure monitoring, logging, and Kusto queriesSafeguard workloads with Azure Security Benchmark (ASB) best practicesReview secure coding principles, write defensive code, fix insecure code, and test code securityLeverage Azure cryptography and confidential computing technologiesUnderstand compliance and risk programsSecure CI / CD automated workflows and pipelinesStrengthen container and network security

  • - Claims, Judgments and Damages
    von Michael Howard
    414,00 €

    This book provides practitioners with all the information and advice they need in advancing, or defending against, any elements of a claim for debt or damages for breach of contract or in tort that involve a foreign currency.

  • von Michael Howard
    40,00 €

    In 1870 Bismarck ordered the Prussian Army to invade France, inciting one of the most dramatic conflicts in European history. It transformed not only the states-system of the Continent but the whole climate of European moral and political thought. The overwhelming triumph of German military might, evoking general admiration and imitation, introduced an era of power politics, which was to reach its disastrous climax in 1914. First published in 1961 and now with a new introduction, The Franco-Prussian War is acknowledged as the definitive history of one of the most dramatic and decisive conflicts in the history of Europe.

  • - Sir Michael Howard and The International Institute for Strategic Studies, 1958-2019
    von Michael Howard
    54,00 €

    In tribute to Sir Michael Howard (1922-2019) and in celebration of his life and work, this Adelphi book collects a selection of his remarks and writings for IISS publications over six decades.

  • - Duality and Conflict in Magick, Mythology and Paganism
    von Michael Howard, Payam Nabarz & Katie Gerrard
    29,00 €

    "Relationship cannot be created without duality: we are divided for love's sake, for the chance of union..."Vs., edited by Kim Huggens, is a unique collection of twenty-one essays exploring the dynamic and wide-ranging nature of duality in magic, paganism and folklore, from polarity to paradox to opposition to friction to union. The essays by magicians, witches, folklorists, sorcerors, Norse and vodou practitioners, weave together diverse threads of wisdom, knowledge, experience and inspiration into a tapestry of fallen angels, heroes, gods, goddesses, fairies, lwa, dreams, myths and stories. The significance of the interplay between two disparate or similar powers is explored through the relationship of divine twins, siblings, lovers and enemies in a variety of different pantheons and tales, from Cain and Abel to Lilith and Eve, from Shiva & Shakti to Inanna and Dumuzi, from Perseus and Andromeda to Ares and Hephastus.The union of divine and mortal is another powerful theme explored in this book, both through the hieros gamos (sacred marriage) and the maryaj (Vodou spirit marriage) where a person weds one of the lwa.Vs. also explores the theme of self and other, as experienced both in ritual techniques for trance and dreaming, and in social commentaries on the diversity of beliefs within the modern esoteric revival such as Wicca, Sorcery and Neopaganism.Vs. covers a span of thousands of years, from ancient writings such as those of Plato and Gnosticism to the modern works of twentieth century magicians such as Austin Osman Spare and Dion Fortune.From the wisdom of the Emerald Tablet to the tales of the Mabinogion, Vs. challenges you in numerous ways to accept diversity and strive for the union of perfection."I am the voice whose sound is manifold and the word whose appearance is multiple." Thunder, Perfect Mind, 3rd century CE

  • - A Traditional Witch's Gramarye
    von Michael Howard
    30,00 €

  • von Michael Howard & M. C. Howard
    47,00 - 94,00 €

  • von Michael Howard
    51,00 €

    Discusses mainly economic factors influencing Barbadian economic development since the Second World War. This work provides an interpretation of the role of foreign investment and public policy in the development process, within the conceptual framework of institutional structural analysis.

  • - The Caribbean Experience
    von Michael Howard
    113,00 €

    This book presents an analysis of Caribbean fiscal problems, with particular emphasis on the relationship between high levels of public expenditure and balance of payments problems. Other issues raised relate to income distribution and problems of taxation and tax reform.

Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.