Reviews
Description
Information security is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel mounting pressure to design, build, and operate "secure" systems. Attacks can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our systems behave the way we expect? What can we do to improve our systems' resilience?
In this pragmatic and comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of securing complex software systems. Using the principles and practices of security chaos engineering, they explore how you can cultivate resilience across the software delivery lifecycle. Attackers and systems will change, but by preparing for adverse events you can ensure it does not disrupt your ability to innovate, move quickly, and achieve your engineering and business goals.
You will:
EXTRA 10 % discount with code: EXTRA
The promotion ends in 18d.02:34:36
The discount code is valid when purchasing from 10 €. Discounts do not stack.
Information security is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel mounting pressure to design, build, and operate "secure" systems. Attacks can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our systems behave the way we expect? What can we do to improve our systems' resilience?
In this pragmatic and comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of securing complex software systems. Using the principles and practices of security chaos engineering, they explore how you can cultivate resilience across the software delivery lifecycle. Attackers and systems will change, but by preparing for adverse events you can ensure it does not disrupt your ability to innovate, move quickly, and achieve your engineering and business goals.
You will:
Reviews