85,67 €
95,19 €
-10% with code: EXTRA
Security Chaos Engineering
Security Chaos Engineering
85,67
95,19 €
  • We will send in 10–14 business days.
Information security is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel mounting pressure to design, build, and operate "secure" systems. Attacks can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our systems behave the way we expect? What can we do to improve our systems' resilience? In this pragmatic and comprehensive guide, authors Kelly Shortridge and Aaron Rinehar…
  • SAVE -10% with code: EXTRA

Security Chaos Engineering (e-book) (used book) | bookbook.eu

Reviews

(4.15 Goodreads rating)

Description

Information security is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel mounting pressure to design, build, and operate "secure" systems. Attacks can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our systems behave the way we expect? What can we do to improve our systems' resilience?

In this pragmatic and comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of securing complex software systems. Using the principles and practices of security chaos engineering, they explore how you can cultivate resilience across the software delivery lifecycle. Attackers and systems will change, but by preparing for adverse events you can ensure it does not disrupt your ability to innovate, move quickly, and achieve your engineering and business goals.

You will:

  • Learn how to design a modern security program aligned to business and engineering goals
  • Make informed decisions at each phase of software delivery to nurture resilience to attack
  • Understand the complex systems dynamics upon which security outcomes depend
  • Navigate technical and organizational trade-offs that distort defensive decision making
  • Explore chaos experimentation as a tool for verifying critical assumptions about systems security and the ROI of security investments
  • Peek behind the scenes of major enterprises that leverage security chaos engineering and learn from their practices

EXTRA 10 % discount with code: EXTRA

85,67
95,19 €
We will send in 10–14 business days.

The promotion ends in 18d.02:34:36

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 0,95 Book Euros!?
  • Author: Kelly Shortridge
  • Publisher:
  • ISBN-10: 1098113829
  • ISBN-13: 9781098113827
  • Format: 17.6 x 23.2 x 2.4 cm, softcover
  • Language: English English

Information security is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel mounting pressure to design, build, and operate "secure" systems. Attacks can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our systems behave the way we expect? What can we do to improve our systems' resilience?

In this pragmatic and comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of securing complex software systems. Using the principles and practices of security chaos engineering, they explore how you can cultivate resilience across the software delivery lifecycle. Attackers and systems will change, but by preparing for adverse events you can ensure it does not disrupt your ability to innovate, move quickly, and achieve your engineering and business goals.

You will:

  • Learn how to design a modern security program aligned to business and engineering goals
  • Make informed decisions at each phase of software delivery to nurture resilience to attack
  • Understand the complex systems dynamics upon which security outcomes depend
  • Navigate technical and organizational trade-offs that distort defensive decision making
  • Explore chaos experimentation as a tool for verifying critical assumptions about systems security and the ROI of security investments
  • Peek behind the scenes of major enterprises that leverage security chaos engineering and learn from their practices

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)