Software Security
-
-
Security Chaos Engineering
- Sustaining Resilience in Software and Systems
- By: Kelly Shortridge, Aaron Rinehart - contributor
- Narrated by: April Doty
- Length: 18 hrs and 36 mins
- Unabridged
-
Overall1
-
Performance1
-
Story1
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering. By preparing for adverse events, you can ensure they don't disrupt your ability to innovate, move quickly, and achieve your engineering and business goals.
-
-
Older methodologies get a fresh coat of paint
- By Jason Marks on 16-01-24
-
Security Chaos Engineering
- Sustaining Resilience in Software and Systems
- Narrated by: April Doty
- Length: 18 hrs and 36 mins
- Release date: 28-11-23
- Language: English
-
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£16.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
Improving Security of Open Source Software in Operational Technology and Industrial Control Systems
- By: CISA FBI NSA Department of Treasury
- Narrated by: Tom Brooks
- Length: 2 hrs and 28 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
This fact sheet will assist with better management of risk from OSS use in OT products and increase resilience using available resources. While several resources and recommendations within this fact sheet are best suited for execution by the vendor or the critical infrastructure owner, collaboration across parties will result in less friction for operator workflows and promote a safer, more reliable system and provision of National Critical Functions.
-
Improving Security of Open Source Software in Operational Technology and Industrial Control Systems
- Narrated by: Tom Brooks
- Length: 2 hrs and 28 mins
- Release date: 25-10-23
- Language: English
-
This fact sheet will assist with better management of risk from OSS use in OT products and increase resilience using available resources....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£6.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
Identity Security for Software Development
- Best Practices That Every Developer Must Know
- By: John Walsh, Uzi Ailon, Matt Barker
- Narrated by: Tom Perkins
- Length: 7 hrs and 47 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Maintaining secrets, credentials, and machine identities in secure ways is an important, though often overlooked, aspect of secure software development. DevOps security often addresses vulnerabilities, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches. That's where an identity security strategy integrated in your code, infrastructure, and environments from day one can help.
-
Identity Security for Software Development
- Best Practices That Every Developer Must Know
- Narrated by: Tom Perkins
- Length: 7 hrs and 47 mins
- Release date: 26-08-25
- Language: English
-
Maintaining secrets, credentials, and machine identities in secure ways is an important, though often overlooked, aspect of secure software development. DevOps security often addresses vulnerabilities, but it neglects broader discussions.
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£12.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
Alice and Bob Learn Application Security
- By: Tanya Janca
- Narrated by: Tanya Janca
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall7
-
Performance6
-
Story6
Learn application security from the very start with this comprehensive and approachable guide. Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software development. This book covers all the basic subjects such as threat modeling and security testing, but also dives deep into more complex and advanced topics for securing modern software systems and architectures.
-
Alice and Bob Learn Application Security
- Narrated by: Tanya Janca
- Length: 10 hrs and 42 mins
- Release date: 27-07-21
- Language: English
-
Learn application security from the very start with this comprehensive and approachable guide. Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate the best security practices in software development.....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£12.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
CISA Open Source Software Security Roadmap
- By: Cybersecurity and Infrastructure Security Agency
- Narrated by: Tom Brooks
- Length: 2 hrs and 6 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
As a public good, open-source software is supported by diverse and wide-ranging communities—which are composed of individual maintainers, non-profit software foundations, and corporate stewards. CISA must integrate into and support these communities, with a particular focus on the critical OSS components that the federal government and critical infrastructure systems rely upon.
-
CISA Open Source Software Security Roadmap
- Narrated by: Tom Brooks
- Length: 2 hrs and 6 mins
- Release date: 26-09-23
- Language: English
-
This roadmap lays out how CISA will help enable the secure usage and development of OSS, both within and outside the federal government....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£6.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
Amazon Web Services in Action
- By: Andreas Wittig, Michael Wittig
- Narrated by: Aiden Humphreys
- Length: 9 hrs and 55 mins
- Unabridged
-
Overall1
-
Performance1
-
Story1
Amazon Web Services in Action introduces you to computing, storing, and networking in the AWS cloud. The audiobook will teach you about the most important services on AWS. You will also learn about best practices regarding security, high availability, and scalability.
-
Amazon Web Services in Action
- Narrated by: Aiden Humphreys
- Length: 9 hrs and 55 mins
- Release date: 12-12-18
- Language: English
-
Amazon Web Services in Action introduces you to computing, storing, and networking in the AWS cloud. The audiobook will teach you about the most important services on AWS. You will also learn about best practices regarding security, high availability, and scalability....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£14.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
The NSA Tips: Software Memory Safety
- National Security Agency April 2023
- By: National Security Agency
- Narrated by: Tom Brooks
- Length: 1 hr and 38 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Modern society relies heavily on software-based automation, implicitly trusting developers to write software that operates in the expected way and cannot be compromised for malicious purposes. While developers often perform rigorous testing to prepare the logic in software for surprising conditions, exploitable software vulnerabilities are still frequently based on memory issues. Examples include overflowing a memory buffer and leveraging issues with how software allocates and de-allocates memory.
-
The NSA Tips: Software Memory Safety
- National Security Agency April 2023
- Narrated by: Tom Brooks
- Length: 1 hr and 38 mins
- Release date: 15-05-23
- Language: English
-
Modern society relies heavily on software-based automation, implicitly trusting developers to write software that operates in the expected way and cannot be compromised for malicious purposes....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£6.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
Tips for: Securing the Software Supply Chain
- Recommended Practices for Managing Open-Source Software and Software Bill of Materials
- By: National Security Agency
- Narrated by: Tom Brooks
- Length: 3 hrs and 45 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
Unmitigated vulnerabilities in the software supply chain continue to pose a significant risk to organizations and our nation. This paper builds on the previously released Recommended Practices Guide for a software supply chain’s development, production and distribution, and management processes, to further increase the resiliency of these processes against compromise.
-
Tips for: Securing the Software Supply Chain
- Recommended Practices for Managing Open-Source Software and Software Bill of Materials
- Narrated by: Tom Brooks
- Length: 3 hrs and 45 mins
- Release date: 20-12-23
- Language: English
-
Unmitigated vulnerabilities in the software supply chain continue to pose a significant risk to organizations and our nation....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£11.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-