Learn how to leverage Windows PowerShell Desired State Configuration to operationalize “DevOps” capabilities on Azure. We start with the basics of PowerShell DSC working through the basic architecture, example uses and preventing “configuration drift.” We review DevOps principles and then apply those principles using PowerShell DSC over Azure to enable continuous deployment.
Everything in the OWASP TOP 10 is covered in this session, including: Injections, Broken Authentication and Session Management, Cross-Site Scripting (XSS), Insecure Direct Object References, Security Misconfiguration, Sensitive Data Exposure, Missing Function Level Access Control, Cross-Site Request Forgery (CSRF), Using Components with Known Vulnerabilities, Unvalidated Redirects and Forwards.
Windows Phone 8.1 offers an enormous leap forward when it comes to security and manageability, making it an excellent choice for those with even the highest level of security requirements. In this session we talk about the key new security features that have been added to the Windows Phone platform that make it a great choice for enterprises and one that can compete to win against other platforms.