1.

Record Nr.

UNINA9910828987303321

Autore

Hillar Gastón C (Gastón Carlos)

Titolo

Django RESTful web services : the easiest way to build Python RESTful APIs and web services with Django / / Gaston C. Hillar

Pubbl/distr/stampa

Birmingham, England : , : Packt Publishing, , 2018

2018

Edizione

[1st edition]

Descrizione fisica

1 online resource (326 pages)

Disciplina

005.72

Soggetti

Web sites - Design

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Sommario/riassunto

Design, build and test RESTful web services with the Django framework and Python About This Book Create efficient real-world RESTful web services with the latest Django framework Authenticate, secure, and integrate third-party packages efficiently in your Web Services Leverage the power of Python for faster Web Service development Who This Book Is For This book is for Python developers who want to create RESTful web services with Django; you need to have a basic working knowledge of Django but no previous experience with RESTful web services is required. What You Will Learn The best way to build a RESTful Web Service or API with Django and the Django REST Framework Develop complex RESTful APIs from scratch with Django and the Django REST Framework Work with either SQL or NoSQL data sources Design RESTful Web Services based on application requirements Use third-party packages and extensions to perform common tasks Create automated tests for RESTful web services Debug, test, and profile RESTful web services with Django and the Django REST Framework In Detail Django is a Python web framework that makes the web development process very easy. It reduces the amount of trivial code, which simplifies the creation of web applications and results in faster development. It is very powerful and a great choice for creating RESTful web services. If you are a Python developer and want to efficiently create RESTful web



services with Django for your apps, then this is the right book for you. The book starts off by showing you how to install and configure the environment, required software, and tools to create RESTful web services with Django and the Django REST framework. We then move on to working with advanced serialization and migrations to interact with SQLite and non-SQL data sources. We will use the features included in the Django REST framework to improve our simple web service. Further, we will create API views to process diverse HTTP requests on objects, go through relationships and hyperlinked API management, and then discover the necessary steps to include security and permissions related to data models and APIs. We will also apply throttling rules and run tests to check that versioning works as expected. Next we will run automated tests to improve code coverage. By the end of the book, you will be able to build RESTful web services with Django. Style and approach The book takes a straightforward approach, giving you the techniques and best use case...

2.

Record Nr.

UNINA9910483628203321

Titolo

Information security practice and experience : 5th international conference, ISPEC 2009, Xi'an, China, April 13-15, 2009 ; proceedings / / Feng Bao, Hui Li, Guilin Wang (eds.)

Pubbl/distr/stampa

Berlin, : Springer, 2009

ISBN

3-642-00843-7

Edizione

[1st ed. 2009.]

Descrizione fisica

1 online resource (XIV, 410 p.)

Collana

Lecture notes in computer science, , 0302-9743 ; ; 5451

Altri autori (Persone)

BaoFeng

LiHui <1968->

WangGuilin, Dr.

Disciplina

005.8

Soggetti

Computer security

Data protection

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

International conference proceedings.

Nota di bibliografia

Includes bibliographical references.

Nota di contenuto

Public Key Encryption -- Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes -- A Ciphertext-Policy Attribute-



Based Encryption Scheme with Constant Ciphertext Length -- RSA-Based Certificateless Public Key Encryption -- Digital Signatures -- Strongly Unforgeable ID-Based Signatures without Random Oracles -- On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings -- System Security -- An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems -- Reconstructing a Packed DLL Binary for Static Analysis -- Static Analysis of a Class of Memory Leaks in TrustedBSD MAC Framework -- Applied Cryptography -- Efficient Concurrent n poly(logn)-Simulatable Argument of Knowledge -- New Constructions for Reusable, Non-erasure and Universally Composable Commitments -- Certificateless Hybrid Signcryption -- On Non-representable Secret Sharing Matroids -- Multimedia Security and DRM -- A Novel Adaptive Watermarking Scheme Based on Human Visual System and Particle Swarm Optimization -- Defending against the Pirate Evolution Attack -- Security Specification for Conversion Technologies of Heterogeneous DRM Systems -- Security Protocols -- Analysing Protocol Implementations -- Measuring Anonymity -- A Hybrid E-Voting Scheme -- Key Exchange and Management -- A Framework for Authenticated Key Exchange in the Standard Model -- Secret Handshake: Strong Anonymity Definition and Construction -- An Extended Authentication and Key Agreement Protocol of UMTS -- Hash-Based Key Management Schemes for MPEG4-FGS -- Hash Functions and MACs -- Twister – A Framework for Secure and Fast Hash Functions -- Preimage Attack on Hash Function RIPEMD -- Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL -- Cryptanalysis -- Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher -- Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2 -- Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard -- On the Correctness of an Approach against Side-Channel Attacks -- Network Security -- Ranking Attack Graphs with Graph Neural Networks -- Implementing IDS Management on Lock-Keeper -- Security Applications -- Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems -- Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing -- Trusted Privacy Domains – Challenges for Trusted Computing in Privacy-Protecting Information Sharing.

Sommario/riassunto

This book constitutes the refereed proceedings of the 5th International Information Security Practice and Experience Conference, ISPEC 2009, held in Xi'an, China in April 2009. The 34 revised full papers were carefully reviewed and selected from 147 submissions. The papers are organized in topical sections on public key encryption, digital signatures, system security, applied cryptography, multimedia security and DRM, security protocols, key exchange and management, hash functions and MACs, cryptanalysis, network security as well as security applications.