
Alice and Bob Learn Application Security
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
Compra ahora por $21.49
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrado por:
-
Tanya Janca
-
De:
-
Tanya Janca
Acerca de esta escucha
Learn application security from the very start with this comprehensive and approachable guide!
Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software development. This book covers all the basic subjects such as threat modeling and security testing, but also dives deep into more complex and advanced topics for securing modern software systems and architectures. Throughout, the book offers analogies, stories of the characters Alice and Bob, real-life examples, technical explanations and diagrams to ensure maximum clarity of the many abstract and complicated subjects. Topics include: secure requirements, design, coding, and deployment; security testing (all forms); common pitfalls; application security programs; securing modern applications; and software developer security hygiene.
Alice and Bob Learn Application Security is perfect for aspiring application security engineers and practicing software developers, as well as software project managers, penetration testers, and chief information security officers who seek to build or improve their application security programs.
PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.
©2021 John Wiley & Sons, Inc. (P)2021 Gildan MediaLos oyentes también disfrutaron...
-
The DevOps Handbook, Second Edition
- How to Create World-Class Agility, Reliability, & Security in Technology Organizations
- De: Gene Kim, Jez Humble, Patrick Debois, y otros
- Narrado por: Ron Butler
- Duración: 15 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
This award-winning and best-selling business handbook for digital transformation is now fully updated and expanded with the latest research and new case studies! Over the last five years, The DevOps Handbook has been the definitive guide for taking the successes laid out in the best-selling The Phoenix Project and applying them in any organization. Now, with this fully updated and expanded edition, it’s time to take DevOps out of the IT department and apply it across the full business.
-
-
Atrocious
- De Anonymous User en 05-25-22
De: Gene Kim, y otros
-
The Phoenix Project
- A Novel about IT, DevOps, and Helping Your Business Win 5th Anniversary Edition
- De: Gene Kim, Kevin Behr, George Spafford
- Narrado por: Chris Ruen
- Duración: 14 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Bill, an IT manager at Parts Unlimited, has been tasked with taking on a project critical to the future of the business, code named Phoenix Project. But the project is massively over budget and behind schedule. The CEO demands Bill must fix the mess in 90 days, or else Bill’s entire department will be outsourced. With the help of a prospective board member and his mysterious philosophy of the Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined.
-
-
Theory and Practice merged
- De Peter en 11-23-15
De: Gene Kim, y otros
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
- 2nd Edition
- De: Ben Malisow
- Narrado por: Daniel Henning
- Duración: 16 h y 13 m
- Versión completa
-
General
-
Narración:
-
Historia
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. Covering all CCSP domains, this book walks you through architectural concepts and design requirements, cloud data security, cloud platform and infrastructure security, cloud application security, operations, and legal and compliance with real-world scenarios to help you apply your skills along the way.
-
-
Disruptive reading of URLs
- De Customer en 04-22-22
De: Ben Malisow
-
Accelerate: Building and Scaling High Performing Technology Organizations
- De: Nicole Forsgren PhD, Jez Humble, Gene Kim
- Narrado por: Nicole Forsgren
- Duración: 4 h y 58 m
- Versión completa
-
General
-
Narración:
-
Historia
How can we apply technology to drive business value? For years we've been told that the performance of software delivery teams doesn't matter - that it can't provide a competitive advantage to our companies. Through four years of groundbreaking research to include data collected from the State of DevOps reports conducted with Puppet, Dr. Nicole Forsgren, Jez Humble, and Gene Kim set out to find a way to measure software delivery performance - and what drives it - using rigorous statistical methods.
-
-
Only if you have nothing else to do
- De Gvido en 07-24-18
De: Nicole Forsgren PhD, y otros
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- De: Nicole Perlroth
- Narrado por: Allyson Ryan
- Duración: 18 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- De since1968 en 02-13-21
De: Nicole Perlroth
-
Software Engineering at Google
- Lessons Learned from Programming Over Time
- De: Titus Winters, Tom Manshreck, Hyrum Wright
- Narrado por: Mark Sando
- Duración: 23 h y 36 m
- Versión completa
-
General
-
Narración:
-
Historia
How can software engineers manage a living codebase that evolves and responds to changing requirements and demands over the length of its life? Based on their experience at Google, software engineers Titus Winters and Hyrum Wright, along with technical writer Tom Manshreck, present a candid and insightful look at how some of the world’s leading practitioners construct and maintain software. This book covers Google’s unique engineering culture, processes, and tools and how these aspects contribute to the effectiveness of an engineering organization.
-
-
not useful
- De Andreas Andersen en 07-21-21
De: Titus Winters, y otros
-
The DevOps Handbook, Second Edition
- How to Create World-Class Agility, Reliability, & Security in Technology Organizations
- De: Gene Kim, Jez Humble, Patrick Debois, y otros
- Narrado por: Ron Butler
- Duración: 15 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
This award-winning and best-selling business handbook for digital transformation is now fully updated and expanded with the latest research and new case studies! Over the last five years, The DevOps Handbook has been the definitive guide for taking the successes laid out in the best-selling The Phoenix Project and applying them in any organization. Now, with this fully updated and expanded edition, it’s time to take DevOps out of the IT department and apply it across the full business.
-
-
Atrocious
- De Anonymous User en 05-25-22
De: Gene Kim, y otros
-
The Phoenix Project
- A Novel about IT, DevOps, and Helping Your Business Win 5th Anniversary Edition
- De: Gene Kim, Kevin Behr, George Spafford
- Narrado por: Chris Ruen
- Duración: 14 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Bill, an IT manager at Parts Unlimited, has been tasked with taking on a project critical to the future of the business, code named Phoenix Project. But the project is massively over budget and behind schedule. The CEO demands Bill must fix the mess in 90 days, or else Bill’s entire department will be outsourced. With the help of a prospective board member and his mysterious philosophy of the Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined.
-
-
Theory and Practice merged
- De Peter en 11-23-15
De: Gene Kim, y otros
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
- 2nd Edition
- De: Ben Malisow
- Narrado por: Daniel Henning
- Duración: 16 h y 13 m
- Versión completa
-
General
-
Narración:
-
Historia
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. Covering all CCSP domains, this book walks you through architectural concepts and design requirements, cloud data security, cloud platform and infrastructure security, cloud application security, operations, and legal and compliance with real-world scenarios to help you apply your skills along the way.
-
-
Disruptive reading of URLs
- De Customer en 04-22-22
De: Ben Malisow
-
Accelerate: Building and Scaling High Performing Technology Organizations
- De: Nicole Forsgren PhD, Jez Humble, Gene Kim
- Narrado por: Nicole Forsgren
- Duración: 4 h y 58 m
- Versión completa
-
General
-
Narración:
-
Historia
How can we apply technology to drive business value? For years we've been told that the performance of software delivery teams doesn't matter - that it can't provide a competitive advantage to our companies. Through four years of groundbreaking research to include data collected from the State of DevOps reports conducted with Puppet, Dr. Nicole Forsgren, Jez Humble, and Gene Kim set out to find a way to measure software delivery performance - and what drives it - using rigorous statistical methods.
-
-
Only if you have nothing else to do
- De Gvido en 07-24-18
De: Nicole Forsgren PhD, y otros
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- De: Nicole Perlroth
- Narrado por: Allyson Ryan
- Duración: 18 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- De since1968 en 02-13-21
De: Nicole Perlroth
-
Software Engineering at Google
- Lessons Learned from Programming Over Time
- De: Titus Winters, Tom Manshreck, Hyrum Wright
- Narrado por: Mark Sando
- Duración: 23 h y 36 m
- Versión completa
-
General
-
Narración:
-
Historia
How can software engineers manage a living codebase that evolves and responds to changing requirements and demands over the length of its life? Based on their experience at Google, software engineers Titus Winters and Hyrum Wright, along with technical writer Tom Manshreck, present a candid and insightful look at how some of the world’s leading practitioners construct and maintain software. This book covers Google’s unique engineering culture, processes, and tools and how these aspects contribute to the effectiveness of an engineering organization.
-
-
not useful
- De Andreas Andersen en 07-21-21
De: Titus Winters, y otros
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
The Pragmatic Programmer: 20th Anniversary Edition, 2nd Edition
- Your Journey to Mastery
- De: David Thomas, Andrew Hunt
- Narrado por: Anna Katarina
- Duración: 9 h y 55 m
- Versión completa
-
General
-
Narración:
-
Historia
Dave Thomas and Andy Hunt wrote the first edition of this influential book in 1999 to help their clients create better software and rediscover the joy of coding. These lessons have helped a generation of programmers examine the very essence of software development. Now, 20 years later, this new edition re-examines what it means to be a modern programmer. Topics range from personal responsibility and career development to architectural techniques for keeping your code flexible and easy to adapt and reuse.
-
-
An excellent and entertaining technical book
- De Amazon Customer en 01-21-20
De: David Thomas, y otros
-
Designing Data-Intensive Applications
- The Big Ideas Behind Reliable, Scalable, and Maintainable Systems
- De: Martin Kleppmann
- Narrado por: Benjamin Lange
- Duración: 20 h y 56 m
- Versión completa
-
General
-
Narración:
-
Historia
Author Martin Kleppmann helps you navigate the diverse data landscape by examining the pros and cons of various technologies for processing and storing data. Software keeps changing, but the fundamental principles remain the same. With this book, software engineers and architects will learn how to apply those ideas in practice, and how to make full use of data in modern applications.
-
-
Must read for senior+ software engineers
- De Navid v en 05-29-21
De: Martin Kleppmann
-
The Unicorn Project
- A Novel About Developers, Digital Disruption, and Thriving in the Age of Data
- De: Gene Kim
- Narrado por: Frankie Corzo
- Duración: 12 h y 24 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Unicorn Project, we follow Maxine, a senior lead developer and architect, as she is exiled to the Phoenix Project, to the horror of her friends and colleagues, as punishment for contributing to a payroll outage. She tries to survive in what feels like a heartless and uncaring bureaucracy and to work within a system where no one can get anything done without endless committees, paperwork, and approvals. One day, she is approached by a ragtag bunch of misfits who say they want to overthrow the existing order, to liberate developers, to bring joy back to technology work.
-
-
This is no Phoenix Project
- De SaintHax en 01-10-20
De: Gene Kim
-
Modern Software Engineering
- Doing What Works to Build Better Software Faster
- De: David Farley
- Narrado por: Amy Gordon
- Duración: 9 h y 37 m
- Versión completa
-
General
-
Narración:
-
Historia
In Modern Software Engineering, continuous delivery pioneer David Farley helps software professionals think about their work more effectively, manage it more successfully, and genuinely improve the quality of their applications, their lives, and the lives of their colleagues.
-
-
Could have been a 1-page bulleted list
- De Elle7se en 12-30-22
De: David Farley
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- De: Cliff Stoll
- Narrado por: Will Damron
- Duración: 12 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- De Todd en 08-11-20
De: Cliff Stoll
-
The Kubernetes Book
- De: Nigel Poulton
- Narrado por: Nigel Poulton
- Duración: 4 h y 33 m
- Versión completa
-
General
-
Narración:
-
Historia
Containers are revolutionizing the way we build, ship, and run our applications. But like all good things, they come with their own set of challenges. This is where Kubernetes enters the scene. Kubernetes helps you deploy and manage containerized applications at scale. With Kubernetes, you can develop your applications on your laptop, deploy to your chosen cloud platform, migrate to a different cloud platform, and even migrate to your private cloud at your on-premises datacenter.
-
-
Finally a technical book for Audible
- De Dave K en 08-28-19
De: Nigel Poulton
-
Computer Networking: All in One
- The Complete Guide to Understanding Wireless Technology, Network Security and Mastering Communication Systems. Includes Simples Approach to Learn Hacking Basics and Kali Linux
- De: Norman Laurence
- Narrado por: Cole Niblett
- Duración: 14 h y 4 m
- Versión completa
-
General
-
Narración:
-
Historia
Do you have a big interest in computers and how they work? Are you interested in learning how to become a hacker? Would you like to learn all of this in a safe and secure manner that can make life easier? Computer Networking: All in One contains all the knowledge you need to achieve your goals in the computer world.
-
-
Almost unlistenable
- De Kelly A. Ohlert en 12-31-21
De: Norman Laurence
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- De: Joseph Menn
- Narrado por: Jonathan Davis
- Duración: 8 h y 11 m
- Versión completa
-
General
-
Narración:
-
Historia
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Liberal Bias Rife and Unchecked
- De Sam Kopp en 12-18-19
De: Joseph Menn
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- De: Phillip L. Wylie, Kim Crawley
- Narrado por: Matthew Josdal
- Duración: 6 h y 22 m
- Versión completa
-
General
-
Narración:
-
Historia
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.
-
-
Excellent book!
- De Jennifer Langford en 08-27-21
De: Phillip L. Wylie, y otros
Lo que los oyentes dicen sobre Alice and Bob Learn Application Security
Calificaciones medias de los clientesReseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.
-
Total
-
Ejecución
-
Historia
- Einar Fredriksen
- 12-14-23
Impressive how much i learned from this as an Audio book. i though it would be hard to not read this.
sometimes the reader reads lots of urls and tables. would be better suited in an accompanying website (or even pdf)
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Maria
- 08-25-21
Amazing Secure Coding Resource!
I highly enjoyed listening to this audio book. Breaking down complex AppSec/Security Software issues into bite size chunks that allow the listener to understand how to write Secure Apps.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
esto le resultó útil a 1 persona
-
Total
-
Ejecución
-
Historia
- Harlow
- 07-12-22
Best in Class Audiobook
At the time of this review there are no audiobooks on this topic that are better than this one.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Anonymous User
- 08-15-22
Your onboarding ti app sec!
Very good asset to initiate you on the world od Application Security. Even better if you don't know anything about that.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña