Unavailable
Unavailable
Unavailable
Audiobook18 hours
Security Chaos Engineering: Sustaining Resilience in Software and Systems
Written by Kelly Shortridge and Aaron Rinehart
Narrated by April Doty
Rating: 0 out of 5 stars
()
Currently unavailable
Currently unavailable
About this audiobook
Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our systems behave the way we expect? What can we do to improve our systems' resilience?
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering. By preparing for adverse events, you can ensure they don't disrupt your ability to innovate, move quickly, and achieve your engineering and business goals.
In this book, you'll learn how to design a modern security program; make informed decisions at each phase of software delivery to nurture resilience and adaptive capacity; understand the complex systems dynamics upon which resilience outcomes depend; navigate technical and organizational trade-offs that distort decision making in systems; explore chaos experimentation to verify critical assumptions about software quality and security; and learn how major enterprises leverage security chaos engineering.
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering. By preparing for adverse events, you can ensure they don't disrupt your ability to innovate, move quickly, and achieve your engineering and business goals.
In this book, you'll learn how to design a modern security program; make informed decisions at each phase of software delivery to nurture resilience and adaptive capacity; understand the complex systems dynamics upon which resilience outcomes depend; navigate technical and organizational trade-offs that distort decision making in systems; explore chaos experimentation to verify critical assumptions about software quality and security; and learn how major enterprises leverage security chaos engineering.
Unavailable
Related to Security Chaos Engineering
Related audiobooks
Security Chaos Engineering: Sustaining Resilience in Software and Systems Rating: 0 out of 5 stars0 ratingsGray Hat: Vulnerability Scanning & Penetration Testing Rating: 0 out of 5 stars0 ratingsCyber Auditing Unleashed: Advanced Security Strategies For Ethical Hackers Rating: 0 out of 5 stars0 ratingsPentesting 101: Cracking Gadgets And Hacking Software Rating: 0 out of 5 stars0 ratingsA Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Rating: 0 out of 5 stars0 ratingsHack Your Way to Security Bundle, 2 in 1 Bundle Rating: 0 out of 5 stars0 ratingsDefense In Depth: Network Security And Cyber Resilience Rating: 0 out of 5 stars0 ratingsThe Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Rating: 0 out of 5 stars0 ratingsZero Day: Novice No More: Expose Software Vulnerabilities And Eliminate Bugs Rating: 0 out of 5 stars0 ratingsZero Trust Security: Building Cyber Resilience & Robust Security Postures Rating: 0 out of 5 stars0 ratingsCybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsHacking for Beginners Rating: 5 out of 5 stars5/5Key Security Concepts that all CISOs Should Know-Cyber Guardians: A CISO’s Guide to Protecting the Digital World Rating: 0 out of 5 stars0 ratingsOWASP Top 10 Vulnerabilities: Beginner's Guide To Web Application Security Risks Rating: 0 out of 5 stars0 ratingsHacking For Dummies, 7th Edition Rating: 5 out of 5 stars5/5How to Build a Cyber-Resilient Organization Rating: 0 out of 5 stars0 ratingsCybersecurity Fundamentals Explained Rating: 0 out of 5 stars0 ratingsDesktop Support Crash Course: Technical Problem Solving And Network Troubleshooting Rating: 0 out of 5 stars0 ratingsRethinking IT Security: What Needs to Be Said — How Can We Solve the IT Security Problem Long Term? Rating: 0 out of 5 stars0 ratingsBurp Suite: Novice To Ninja: Pen Testing Cloud, Network, Mobile & Web Applications Rating: 0 out of 5 stars0 ratingsHow Cyber Security Can Protect Your Business: A guide for all stakeholders Rating: 0 out of 5 stars0 ratingsEthical Hacking for Beginners: Comprehensive Introduction to the World of Cybersecurity Rating: 0 out of 5 stars0 ratingsMalware Analysis: Digital Forensics, Cybersecurity, And Incident Response Rating: 0 out of 5 stars0 ratingsTrojan Exposed: Cyber Defense And Security Protocols For Malware Eradication Rating: 0 out of 5 stars0 ratingsRed Team Operations: Attack: Black Box Hacking, Social Engineering & Web App Scanning Rating: 5 out of 5 stars5/5The Ultimate Kali Linux Book - Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire Rating: 0 out of 5 stars0 ratingsMalware Reverse Engineering: Cracking The Code Rating: 0 out of 5 stars0 ratingsCISSP All-in-One Exam Guide, Ninth Edition Rating: 5 out of 5 stars5/5NIST Cloud Security: Cyber Threats, Policies, And Best Practices Rating: 5 out of 5 stars5/5
Computers For You
Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Data Science For Dummies: 2nd Edition Rating: 4 out of 5 stars4/5The Emperor's New Mind: Concerning Computers, Minds, and the Laws of Physics Rating: 4 out of 5 stars4/5Algorithms to Live By: The Computer Science of Human Decisions Rating: 4 out of 5 stars4/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5Once Upon an Algorithm: How Stories Explain Computing Rating: 4 out of 5 stars4/5Computational Thinking Rating: 4 out of 5 stars4/5Artificial Intelligence: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5The Dark Net: Inside the Digital Underworld Rating: 4 out of 5 stars4/5Artificial Intelligence For Dummies Rating: 4 out of 5 stars4/5Machine Learning: Deep Learning, Text Analytics, and Reinforcement Learning with Big Data Rating: 4 out of 5 stars4/5A Brief History of Artificial Intelligence: What It Is, Where We Are, and Where We Are Going Rating: 4 out of 5 stars4/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5Computer Science Beginners Crash Course: Coding Data, Python, Algorithms & Hacking Rating: 4 out of 5 stars4/5How to Do Nothing: Resisting the Attention Economy Rating: 4 out of 5 stars4/5Elon Musk Rating: 5 out of 5 stars5/5Alone Together: Why We Expect More from Technology and Less from Each Other Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution Rating: 4 out of 5 stars4/5Atlas of AI: Power, Politics, and the Planetary Costs of Artificial Intelligence Rating: 5 out of 5 stars5/5The Year in Tech, 2023: The Insights You Need from Harvard Business Review Rating: 4 out of 5 stars4/5Failure Is Not an Option: Mission Control from Mercury to Apollo 13 and Beyond Rating: 5 out of 5 stars5/5
Reviews for Security Chaos Engineering
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews