The first part of a three part book series providing broad and in-depth coverage on what Software Developers/Engineers, DevOps Engineers and architects need to know in order to create robust, reliable, maintainable and secure software, networks and other, that are delivered continuously, on time, with no nasty surprises.
The full book series can be found here
Progress This Fascicle (part of the three part book series) is now complete and available to read online, purchase electronic or hard copy. DetailsThe rest of the book series (Fascicle 1 and 2) focusses on the specific areas addressed on the covers of each book. Allowing your purple team to create security focussed product backlog items and insert them into your usual Product Backlog.
Kim also runs workshops based on the content of this book for development teams wishing to improve their security stature.
Purpose My intention with the “Holistic Info-Sec for Web Developers” series is in many ways to help you answer your own questions and show you that creating systems and arming people to withstand the types of attacks commonly encountered today is not out of reach of mere mortals. That by simply lifting the lower hanging fruit for an attacker often means they will move on to an easier target. Unless they are specifically targeting you. In which case you should find many of the risks and countermeasures I address, effective for increasing the difficulty for your attacker, and thus dramatically increasing your chances of defence and counter-attack. Support You can reach Kim at his github where the work takes place, from his website, or twitter @binarymist. Errata (errors, typos, etc.)Kim also runs two information security conferences (OWASP NZ Day and Christchurch Hacker Conference), is a host on Software Engineering Radio and blogs at binarymist.io/blog.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4