Jump to content
Kev

[eBook] IT-Security for Developers

Recommended Posts

A Drama in Three Acts

Security is perhaps the most neglected area of information technology. It is extensive, diverse and complex. It is political. It is ungrateful. It is a drama. An attempt to cope in three acts.

 

1*wb2WX47RAOm9r6_0yzoj0g.jpeg

 

About the Author

The Author is working over 25 years in IT and mechanical engineering businesses as architect, developer, UNIX system/network administrator and entrepreneur. As cofounder of Micro-Colocation.com, his focus since 2021 has been on green edge computing for small computers. This colocation service was recently released and is happy to welcome any Raspberry Pi, Odroid, Jetson Nano and other Single Board Computer enthusiasts. CC licensed texts like this drama are created within the working hours of this company. You can support the text production by sharing the Micro-Colocation.com link in your network and, of course by booking colocation services. Many thanks.

 

Table of Contents

Prologue........................................................................................................................2
First Act.........................................................................................................................4
First Scene – The Dilemmas...............................................................................4
Second Scene – The Developer..........................................................................6
Third scene – The Allies......................................................................................7
Fourth Scene – The Concept............................................................................12
Second Act..................................................................................................................15
First Scene – The Application..........................................................................15
Second Scene – The Identification..................................................................18
Third Scene – The Access..................................................................................22
Fourth Scene – The Encryption.......................................................................24
Third Act.....................................................................................................................26
Last Scene: The Implementation.....................................................................26
Epilogue......................................................................................................................29
Please / Thank you...................................................................................................29
Props............................................................................................................................30

 

eBook Versions:

English Translation:
IT Security for Developers — A Drama in Three Acts | May 2022

 

Deutsche Originalversion, empfohlen für Muttersprachler:
IT Sicherheit für Entwickler — Ein Drama in drei Akten | Mai 2022

 

Source

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...