Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SHARKS in the MOAT: How to Create Truly Secure Software

Buy
Believe it or not, there is a striking similarity between medieval castle design and how we protect networks and data in the 21st century. By examining how our ancestors fought off invading armies, it becomes much easier to understand the latest strategies for keeping hackers at-bay. This book is designed for anyone who wants to understand how to create and deploy secure software that can stand up to the most malevolent attacks by the bad guys. Whether you are a PM, product owner, developer, architect, tester, DevOps or infrastructure team member, DBA, engineering manager, security manager, in charge of change management or even a security auditor – there is a mountain of information for you specifically. Obviously, since this is a book on creating secure software, the developer and architect roles have the most information, but even those two roles together represent less than half of the book’s content.As a bonus, once you finish reading the content inside, you will be more than prepared to take the Certified Secure Software Lifecycle Professional exam, or CSSLP exam, if you wish to do so.This book is also available as an audio book read by the author.
(HTML tags aren't allowed.)

Microeconomics
Microeconomics
Where microeconomics gets down to work

Like no other text for the intermediate microeconomics course, Goolsbee, Levitt, and Syverson’s Microeconomics bridges the gap between the theory and practice, providing an empirical dimension that makes the course immediately relevant and useful to students. With carefully crafted...

Pro Git
Pro Git

Pro Git (Second Edition) is your fully-updated guide to Git and its usage in the modern world. Git has come a long way since it was first developed by Linus Torvalds for Linux kernel development. It has taken the open source world by storm since its inception in 2005, and this book teaches you how to use it like a pro.

...

High Performance Computing (RISC Architectures, Optimization & Benchmarks)
High Performance Computing (RISC Architectures, Optimization & Benchmarks)

The computing power that's available on the average desktop has exploded in the past few years. A typical PC has performance exceeding that of a multi-million dollar supercomputer a mere decade ago. To some people, that might mean that it's time to sit back and watch computers get faster: performance is no longer an issue,...


Running Linux
Running Linux

Once a little-known productivity boost for personal computers, Linux is now becoming a central part of computing environments everywhere. This operating system now serves as corporate hubs, Web servers, academic research platforms, and program development systems. All along it's also managed to keep its original role as an...

Statistical Pattern Recognition
Statistical Pattern Recognition

Statistical pattern recognition relates to the use of statistical techniques for analysing data measurements in order to extract information and make justified decisions. It is a very active area of study and research, which has seen many advances in recent years. Applications such as data mining, web searching, multimedia data retrieval,...

Pro Oracle Spatial
Pro Oracle Spatial
In the past decade, location analysis has outgrown its traditional use in Geographic Information Systems (GIS) and has become a critical component in business applications. The vast majority of commercial franchises employ location-based analysis and services in their day-to-day activities. With this growing usage, scalable and...
©2020 LearnIT (support@pdfchm.net) - Privacy Policy