Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Jupyter Cookbook

You're reading from   Jupyter Cookbook Over 75 recipes to perform interactive computing across Python, R, Scala, Spark, JavaScript, and more

Arrow left icon
Product type Paperback
Published in Apr 2018
Publisher Packt
ISBN-13 9781788839440
Length 238 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Dan Toomey Dan Toomey
Author Profile Icon Dan Toomey
Dan Toomey
Arrow right icon
View More author details
Toc

Table of Contents (12) Chapters Close

Preface 1. Installation and Setting up the Environment FREE CHAPTER 2. Adding an Engine 3. Accessing and Retrieving Data 4. Visualizing Your Analytics 5. Working with Widgets 6. Jupyter Dashboards 7. Sharing Your Code 8. Multiuser Jupyter 9. Interacting with Big Data 10. Jupyter Security 11. Jupyter Labs

Introduction


Web security is concerned with assets or information that you have exposed on the internet via a web application.

In this chapter, we investigate the various security mechanisms available for our Jupyter Notebook.

How much risk?

An application would need more security if critical or personal information were used on it; for example, credit cards. At the other end of the spectrum would be a site that is only providing information that is generally known.

In the case of a Jupyter application, you have to make that decision. Is the application or data being exposed of high importance to your company or project? There are many Jupyter applications (or web applications in general) that do not require a high degree of security as the information/algorithms being used are generally known.

Known vulnerabilities

Many web applications are built upon a well-known framework that has been in use for some time. As such, these frameworks have already worked through the known vulnerabilities they...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image