Audiobook7 hours
The DevSecOps Playbook: Deliver Continuous Security at Speed
Written by Sean D. Mack
Narrated by William Sarris
Rating: 0 out of 5 stars
()
About this audiobook
An essential and up-to-date guide to DevSecOps
In The DevSecOps Playbook: Deliver Continuous Security at Speed, the chief information and information security officer at Wiley, Sean D. Mack, delivers an insightful and practical discussion of how to keep your business secure. You'll learn how to leverage the classic triad of people, process, and technology to build strong cybersecurity infrastructure and practices. You'll also discover the shared responsibility model at the core of DevSecOps as you explore the principles and best practices that make up contemporary frameworks.
The book explains why it's important to shift security considerations to the front-end of the development cycle and how to do that, as well as describing the evolution of the standard security model over the last few years and how that has impacted modern cybersecurity.
A must-listen roadmap to DevSecOps for practicing security engineers, security leaders, and privacy practitioners, The DevSecOps Playbook will also benefit students of information technology and business, as well as governance, risk, and compliance specialists who want to improve their understanding of cybersecurity's impact on their organizations.
In The DevSecOps Playbook: Deliver Continuous Security at Speed, the chief information and information security officer at Wiley, Sean D. Mack, delivers an insightful and practical discussion of how to keep your business secure. You'll learn how to leverage the classic triad of people, process, and technology to build strong cybersecurity infrastructure and practices. You'll also discover the shared responsibility model at the core of DevSecOps as you explore the principles and best practices that make up contemporary frameworks.
The book explains why it's important to shift security considerations to the front-end of the development cycle and how to do that, as well as describing the evolution of the standard security model over the last few years and how that has impacted modern cybersecurity.
A must-listen roadmap to DevSecOps for practicing security engineers, security leaders, and privacy practitioners, The DevSecOps Playbook will also benefit students of information technology and business, as well as governance, risk, and compliance specialists who want to improve their understanding of cybersecurity's impact on their organizations.
Related to The DevSecOps Playbook
Related audiobooks
Site Reliability Engineering: How Google Runs Production Systems Rating: 5 out of 5 stars5/5The CTO Playbook: A leadership book for people working with developers Rating: 0 out of 5 stars0 ratingsLearning Agile: Understanding Scrum, XP, Lean, and Kanban Rating: 4 out of 5 stars4/5Accelerated DevOps with AI, ML & RPA: Non-Programmer’s Guide to AIOPS & MLOPS Rating: 4 out of 5 stars4/5Letters to a New Developer: What I Wish I Had Known When Starting My Development Career Rating: 4 out of 5 stars4/5Monolith to Microservices: Evolutionary Patterns to Transform Your Monolith Rating: 4 out of 5 stars4/5Alice and Bob Learn Application Security Rating: 5 out of 5 stars5/5Database Internals: A Deep Dive into How Distributed Data Systems Work, 1st Edition Rating: 5 out of 5 stars5/5Lean Enterprise: How High Performance Organizations Innovate at Scale Rating: 5 out of 5 stars5/5Software Engineering at Google: Lessons Learned from Programming Over Time Rating: 4 out of 5 stars4/5Product Leadership: How Top Product Managers Launch Awesome Products and Build Successful Teams Rating: 4 out of 5 stars4/5NIST Cloud Security: Cyber Threats, Policies, And Best Practices Rating: 0 out of 5 stars0 ratingsA Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Rating: 0 out of 5 stars0 ratingsGoogle Cloud Cookbook: Practical Solutions for Building and Deploying Cloud Services, 1st Edition Rating: 5 out of 5 stars5/5Fundamentals of Software Architecture: An Engineering Approach Rating: 4 out of 5 stars4/5Software Development Fundamentals Rating: 5 out of 5 stars5/5Fundamentals of Data Engineering: Plan and Build Robust Data Systems Rating: 5 out of 5 stars5/5There's No Such Thing as an IT Project: A Handbook for Intentional Business Change Rating: 5 out of 5 stars5/5Production Kubernetes: Building Successful Application Platforms Rating: 3 out of 5 stars3/5Data Mesh: Delivering Data-Driven Value at Scale Rating: 5 out of 5 stars5/5Clean Architecture: A Craftsman's Guide to Software Structure and Design Rating: 5 out of 5 stars5/5How to Measure Anything in Cybersecurity Risk, 2nd Edition Rating: 0 out of 5 stars0 ratingsCloud FinOps, 2nd Edition: Collaborative, Real-Time Cloud Value Decision Making Rating: 0 out of 5 stars0 ratingsDevops: Building Software With Lean Process For Modern Business Rating: 3 out of 5 stars3/5Product Management in Practice: A Real-World Guide to the Key Connective Role of the 21st Century Rating: 4 out of 5 stars4/5Generative AI: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems Rating: 5 out of 5 stars5/5The New Edge in Knowledge: How Knowledge Management Is Changing the Way We Do Business Rating: 3 out of 5 stars3/5Azure DevOps Engineer: Exam AZ-400: Azure DevOps Engineer: Exam AZ-400 Designing and Implementing Microsoft DevOps Solutions Rating: 0 out of 5 stars0 ratings
Security For You
Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime Rating: 4 out of 5 stars4/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5Darknet: A Beginner's Guide to Staying Anonymous Online Rating: 5 out of 5 stars5/5Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Rating: 4 out of 5 stars4/5Through the Firewall: The Alchemy of Turning Crisis into Opportunity Rating: 5 out of 5 stars5/5Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Rating: 5 out of 5 stars5/5Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Rating: 0 out of 5 stars0 ratings(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Rating: 5 out of 5 stars5/5The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Rating: 4 out of 5 stars4/5Cybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5Cybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5HACKING: How to Hack Web Apps Rating: 5 out of 5 stars5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Certified Information Security Manager CISM Study Guide Rating: 0 out of 5 stars0 ratingsThe Smartest Person in the Room Rating: 5 out of 5 stars5/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5Bitcoin for Beginners & Dummies: Cryptocurrency & Blockchain Rating: 4 out of 5 stars4/5
Reviews for The DevSecOps Playbook
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews