Tanya Janca - Alice and Bob Learn Application Security
Here you can read online Tanya Janca - Alice and Bob Learn Application Security full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2020, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:
Romance novel
Science fiction
Adventure
Detective
Science
History
Home and family
Prose
Art
Politics
Computer
Non-fiction
Religion
Business
Children
Humor
Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.
- Book:Alice and Bob Learn Application Security
- Author:
- Genre:
- Year:2020
- Rating:3 / 5
- Favourites:Add to favourites
- Your mark:
- 60
- 1
- 2
- 3
- 4
- 5
Alice and Bob Learn Application Security: summary, description and annotation
We offer to read an annotation, description, summary or preface (depends on what the author of the book "Alice and Bob Learn Application Security" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.
Alice and Bob Learn Application Security — read online for free the complete book (whole text) full work
Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Alice and Bob Learn Application Security" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.
Font size:
Interval:
Bookmark:
- Introduction
- Chapter 1
- Chapter 2
- Chapter 3
- Chapter 4
- Chapter 5
- Chapter 6
- Chapter 7
- Chapter 8
Tanya Janca
Copyright 2021 by John Wiley & Sons, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN: 978-1-119-68735-1
ISBN: 978-1-119-68739-9 (ebk)
ISBN: 978-1-119-68740-5 (ebk)
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at www.wiley.com/go/permissions
.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or website may provide or recommendations it may make. Further, readers should be aware that Internet websites listed in this work may have changed or disappeared between when this work was written and when it is read.
For general information on our other products and services please contact our Customer Care Department within the United States at (877) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.
Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at booksupport.wiley.com
. For more information about Wiley products, visit www.wiley.com
.
Library of Congress Control Number: 2020945323
Trademarks: Wiley and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.
I dedicate this book to my tireless cheering squad: Lexy, Matteus, Ash, and Vane. Your constant support, encouragement, and celebration of each milestone kept me going. Also, thank you for not judging me for how much ice cream I ate during my editing.
Tanya Janca, also known as SheHacksPurple, is the founder of We Hack Purple, an online learning academy, community, and podcast that revolves around teaching everyone to create secure software. She is also the co-founder of WoSEC: Women of Security, is a project leader for OWASP DevSlop, and is a chapter leader for OWASP Victoria. Tanya has been coding and working in IT for over twenty years, has won numerous awards, and has been everywhere from startups to public service to tech giants (Microsoft, Adobe, and Nokia). She has worn many hats: startup founder, pentester, CISO, AppSec Engineer, and software developer. She is an award-winning public speaker, active blogger and streamer, and has delivered hundreds of talks and trainings on six continents. She values diversity, inclusion, and kindness, which shines through in her countless initiatives.
Dominique Righetto started his career in software development before moving, eight years later, to the security side while continuing to live on the border between the two worlds. Dominique is strongly interested in the offensive and defensive aspects of application security. When he moved into the field of security, his objective was (and always has been) to help development teams integrate security into their projects, using a pragmatic point of view. Dominique has been an active member of the OWASP foundation since 2011, where he contributes to different projects, mainly those concerning the web and mobile domain (his domains specialization). Adept at the open source philosophy, he contributes to various open source projects in his spare time. His homepage is righettod.eu
.
Elie Saad is an experienced information security officer working in the banking industry. He leads and contributes to various standardization initiatives at OWASP and regularly publishes articles on the subject. His main drive is to provide guidance for software developers to own and champion security. He has presented several local talks to bring security closer to newcomers and has been a podcast guest on Security Journey, raising the awareness of various AppSec projects. He is an advocate for breaking down the fragmented culture in the AppSec world. In addition, Elie enjoys taking time to appreciate the simpler things in life, a nice breather in the mountains, and a tasteful glass of whiskey (single malt, of course). You can find him on Twitter (.
I would like to thank Jim Minatel, my publisher, for helping me decide that I was ready to write a book, and what type of book to write. Thank you, Adaobi Obi Tulton, my editor, for your endless patience, guidance, and very-helpful-check-ins that kept me on track for the largest project of my professional life. Thank you to Dominique Righetto and Elie Saad, my technical editors. I could never afford to pay you for how hard you both worked to ensure I did not make any grave technical errors. I do not have words to convey my appreciation for your time, expertise, and support. Thank you all for coming on this journey with me.
Why application security? Why should you read this book? Why is security important? Why is it so hard?
If you have picked up this book, you likely already know the answer to this question. You have seen the headlines of companies that have been hacked, data breached, identities stolen, businesses and lives ruined. However, you may not be aware that the number-one reason for data breaches is insecure software, causing between 26% and 40% of leaked and stolen records (Verizon Breach Report, 2019). Yet when we look at the budgets of most companies, the amount allocated toward ensuring their software is secure is usually much, much lower than that.
Next pageFont size:
Interval:
Bookmark:
Similar books «Alice and Bob Learn Application Security»
Look at similar books to Alice and Bob Learn Application Security. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.
Discussion, reviews of the book Alice and Bob Learn Application Security and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.