185 rezultatov
-
Security Chaos Engineering(2023) SHORTRIDGE, KELLYIn this pragmatic and comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of securing complex software systems. Using the principles and practices of security chaos engineering, software engineering teams willVezava: Mehka68,39 € -
Intelligence-Driven Incident Response(2023) BROWN, REBEKAH,ROBERTS, SCOTT JWith this updated edition, you'll learn the fundamentals of intelligence analysis including the best ways to incorporate these techniques into your incident response process.Vezava: Mehka68,39 € -
Agile Application Security(2017) SMITH, RICH,BRUNTON-SPALL, MICHAEL,BELL, LAURA,BIRD, JIMWritten by security experts and agile veterans, this book begins by introducing security principles to agile practitioners, and agile principles to security practitioners. The authors also reveal problems they encountered in their own experiences with agiVezava: Mehka61,94 € -
Cybersecurity All-in-One For Dummies(2023) STEINBERG, JOSEPH,BEAVER, KEVIN,WINKLER, IRA,COOMBS, TEDVezava: Mehka45,14 € -
Modern Data Protection(2021) PRESTON, W. CURTISGive your organization data protection without the uncertainty and cost overruns experienced by your predecessors or other companies. To help you navigate the breadth and depth of this challenge, this book presents several solutions so you can determine wVezava: Mehka68,39 € -
Threat Modeling(2020) TARANDACH, IZAR,COLES, MATTHEW J.Threat modeling is one of the most essential--and most misunderstood--parts of the development lifecycle. Whether you're a security practitioner or a member of a development team, this book will help you gain a better understanding of how you can apply coVezava: Mehka68,39 € -
Container Security(2020) RICE, LIZTo facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. This practical book examines key underlying technologies to help developers, operators, and security professVezava: Mehka58,07 € -
Security Risk Management(2011) WHEELER, EVAN (OMGEO, BOSTON, MA, USA)Teaches you practical techniques that can be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. This book helps you break free from the so-called "best practices" argument by articulatingVezava: Mehka57,01 € -
-
Programming with STM32: Getting Started with the Nucleo Board and C/C++(2018) NORRIS, DONALDVezava: Mehka30,88 € -
Evidence-Based Cybersecurity(2022) POMERLEAU, PIERRE-LUC,MAIMON, DAVIDThis book seeks to explain the foundation of the evidence-based cybersecurity approach, reviews its relevance in the context of existing security tools and policies, and the authors provide concrete examples of how adopting this approach could improve cybVezava: Trda117,24 € -
Security as Code(2023) DAS, BK SARTHAK,CHU, VIRGINIAIn this book, authors BK Sarthak Das and Virginia Chu demonstrate how to use this methodology to secure any application and infrastructure you want to deploy. With Security as Code, you'll learn how to create a secure containerized application with KubernVezava: Mehka58,07 € -
97 Things Every Information Security Professional Should Know(2021) MORILLO, CHRISTINAIn this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll learn how to expand your skills and solve common issues by working through evVezava: Mehka56,06 €










