Holistic Information Security
Seiten
2017
Packt Publishing Limited (Verlag)
9781788292160 (ISBN)
Packt Publishing Limited (Verlag)
9781788292160 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Covers information security across the whole website lifecycle. This book illustrates what web developers and architects need to know in order to create robust, reliable, maintainable and secure software. It focuses on penetration testing, common risks, and the countermeasures you need to put into place to defeat them.
This book covers information security across the whole website lifecycle. It illustrates what web developers and architects need to know in order to create robust, reliable, maintainable and secure software. It covers penetration testing, common risks, and the countermeasures you need to put into place to defeat them.
About This Book
* Learn to improve your website security
*Teaches methods for maximizing security at minimal cost, by introducing effective measures at key stages
*Practical advive that can be immediately applied to websites and team processed to strengthen against attack
*How to think for yourself when you're under attack
Who This Book Is For
This is an in-depth guide written for Web Developers, Engineers, Architects and their teams. It is geared towards teams following an agile methodology, but will be useful for any team looking to harden a website against attack.
What You Will Learn
* How to use the Schneier threat modelling approach
*Setting up your tool-belt
*The process of penetration testing
*A collection of processes and practises formulated from penetration testing
*How to augment your Scrum Sprints to increase security
*How to survive if you are being directly targeted and attacked
*How to think for yourself when you're under pressure in the modern security world
In Detail
This book begins a new Holistic Infosec series that will give you a broad and in-depth coverage of what web developers and architects need to know today to create robust, reliable, maintainable and secure software, and networks - that are delivered continuously, on time, with no nasty surprises.
Holistic Information Security begins by taking the reader to the 30,000' view, so you can start to see the entire security landscape. It then explains a very simple threat modelling approach created by Bruce Schneier, called the Sensible Security Model (SSM).
Kim Carter then takes Schneier's approach and applies it to increasingly fine details of Information Security picture. Kim details how to set-up a security focussed distribution with all the tools and configuration options required for working through the book. You'll then walk through the Process and Practices that attackers often execute, and Kim provides key techniques from that experience to show you how to train website defenders. You'll also learn how website defenders can find defects from the most expensive places through to the cheapest places within your Sprint cycles.
This book will ultimately help you answer your own questions, and you'll learn how to create systems, and arm people, to withstand the types of attacks commonly encountered today. You'll see that by simply lifting the lower hanging fruit for an attacker, they will frequently move on to an easier target. Unless they are specifically targeting you... so Kim Carter then goes into depth about how you can find many of the risks and countermeasures to increase the difficulty for your attacker, and dramatically increase your chances of defense and counter-attack in the modern security world.
This book covers information security across the whole website lifecycle. It illustrates what web developers and architects need to know in order to create robust, reliable, maintainable and secure software. It covers penetration testing, common risks, and the countermeasures you need to put into place to defeat them.
About This Book
* Learn to improve your website security
*Teaches methods for maximizing security at minimal cost, by introducing effective measures at key stages
*Practical advive that can be immediately applied to websites and team processed to strengthen against attack
*How to think for yourself when you're under attack
Who This Book Is For
This is an in-depth guide written for Web Developers, Engineers, Architects and their teams. It is geared towards teams following an agile methodology, but will be useful for any team looking to harden a website against attack.
What You Will Learn
* How to use the Schneier threat modelling approach
*Setting up your tool-belt
*The process of penetration testing
*A collection of processes and practises formulated from penetration testing
*How to augment your Scrum Sprints to increase security
*How to survive if you are being directly targeted and attacked
*How to think for yourself when you're under pressure in the modern security world
In Detail
This book begins a new Holistic Infosec series that will give you a broad and in-depth coverage of what web developers and architects need to know today to create robust, reliable, maintainable and secure software, and networks - that are delivered continuously, on time, with no nasty surprises.
Holistic Information Security begins by taking the reader to the 30,000' view, so you can start to see the entire security landscape. It then explains a very simple threat modelling approach created by Bruce Schneier, called the Sensible Security Model (SSM).
Kim Carter then takes Schneier's approach and applies it to increasingly fine details of Information Security picture. Kim details how to set-up a security focussed distribution with all the tools and configuration options required for working through the book. You'll then walk through the Process and Practices that attackers often execute, and Kim provides key techniques from that experience to show you how to train website defenders. You'll also learn how website defenders can find defects from the most expensive places through to the cheapest places within your Sprint cycles.
This book will ultimately help you answer your own questions, and you'll learn how to create systems, and arm people, to withstand the types of attacks commonly encountered today. You'll see that by simply lifting the lower hanging fruit for an attacker, they will frequently move on to an easier target. Unless they are specifically targeting you... so Kim Carter then goes into depth about how you can find many of the risks and countermeasures to increase the difficulty for your attacker, and dramatically increase your chances of defense and counter-attack in the modern security world.
Kim Carter is an experienced Senior Software Architect / Engineer, Entrepreneur and the founder of BinaryMist. He is passionate about mentoring and motivating cross functional, self managing teams, and is the OWASP NZ Chapter Leader. Kim's website is https://binarymist.io.
| Erscheint lt. Verlag | 30.6.2017 |
|---|---|
| Verlagsort | Birmingham |
| Sprache | englisch |
| Maße | 191 x 235 mm |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| ISBN-13 | 9781788292160 / 9781788292160 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …
Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Lehrbuch für Prüfung und Praxis
Buch | Softcover (2023)
Springer Fachmedien Wiesbaden GmbH (Verlag)
CHF 27,95
Management der Informationssicherheit und Vorbereitung auf die …
Buch (2024)
Carl Hanser (Verlag)
CHF 97,95