Software Security
-
-
The Complete Software Developer's Career Guide
- How to Learn Programming Languages Quickly, Ace Your Programming Interview, and Land Your Software Developer Dream Job
- Auteur(s): John Sonmez
- Narrateur(s): John Sonmez
- Durée: 20 h et 4 min
- Version intégrale
-
Au global67
-
Performance57
-
Histoire56
Technical knowledge alone isn't enough - increase your software development income by leveling up your soft skills Early in his software developer career, John Sonmez discovered that technical knowledge alone isn't enough to break through to the next income level - developers need "soft skills" like the ability to learn new technologies just in time, communicate clearly with management and consulting clients, negotiate a fair hourly rate, and unite teammates and coworkers in working toward a common goal.
-
-
Hey John! I love your book.
- Écrit par LapuLapu le 2019-04-05
-
The Complete Software Developer's Career Guide
- How to Learn Programming Languages Quickly, Ace Your Programming Interview, and Land Your Software Developer Dream Job
- Narrateur(s): John Sonmez
- Durée: 20 h et 4 min
- Date de publication: 2017-12-21
- Langue: Anglais
-
Early in his software developer career, John Sonmez discovered that technical knowledge alone isn't enough to break through to the next income level - developers need "soft skills" like the ability to learn new technologies....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
37,53 $ ou gratuit avec l'essai de 30 jours
-
-
-
CISA Open Source Software Security Roadmap
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
As a public good, open-source software is supported by diverse and wide-ranging communities—which are composed of individual maintainers, non-profit software foundations, and corporate stewards. CISA must integrate into and support these communities, with a particular focus on the critical OSS components that the federal government and critical infrastructure systems rely upon.
-
CISA Open Source Software Security Roadmap
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Date de publication: 2023-09-26
- Langue: Anglais
-
This roadmap lays out how CISA will help enable the secure usage and development of OSS, both within and outside the federal government....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Security Chaos Engineering
- Sustaining Resilience in Software and Systems
- Auteur(s): Kelly Shortridge, Aaron Rinehart - contributor
- Narrateur(s): April Doty
- Durée: 18 h et 36 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering. By preparing for adverse events, you can ensure they don't disrupt your ability to innovate, move quickly, and achieve your engineering and business goals.
-
-
Great content but horribly annoying computer voice
- Écrit par Utilisateur anonyme le 2024-04-08
-
Security Chaos Engineering
- Sustaining Resilience in Software and Systems
- Narrateur(s): April Doty
- Durée: 18 h et 36 min
- Date de publication: 2023-11-28
- Langue: Anglais
-
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
33,40 $ ou gratuit avec l'essai de 30 jours
-
-
-
Identity Security for Software Development
- Best Practices That Every Developer Must Know
- Auteur(s): John Walsh, Uzi Ailon, Matt Barker
- Narrateur(s): Tom Perkins
- Durée: 7 h et 47 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Maintaining secrets, credentials, and machine identities in secure ways is an important, though often overlooked, aspect of secure software development. DevOps security often addresses vulnerabilities, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches. That's where an identity security strategy integrated in your code, infrastructure, and environments from day one can help.
-
Identity Security for Software Development
- Best Practices That Every Developer Must Know
- Narrateur(s): Tom Perkins
- Durée: 7 h et 47 min
- Date de publication: 2025-08-26
- Langue: Anglais
-
Maintaining secrets, credentials, and machine identities in secure ways is an important, though often overlooked, aspect of secure software development. DevOps security often addresses vulnerabilities, but it neglects broader discussions.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Docker in Action
- Auteur(s): Jeff Nickoloff
- Narrateur(s): Aiden Humphreys
- Durée: 10 h et 12 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Docker in Action teaches listeners how to create, deploy, and manage applications hosted in Docker containers. After starting with a clear explanation of the Docker model, you will learn how to package applications in containers, including techniques for testing and distributing applications. You will also learn how to run programs securely and how to manage shared resources. Using carefully designed examples, the book teaches you how to orchestrate containers and applications from installation to removal.
-
Docker in Action
- Narrateur(s): Aiden Humphreys
- Durée: 10 h et 12 min
- Date de publication: 2018-11-08
- Langue: Anglais
-
Docker in Action teaches listeners how to create, deploy, and manage applications hosted in Docker containers. After an explanation of the Docker model, you will learn how to package applications in containers, including techniques for testing and distributing applications....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Programming for Beginners
- This Book Includes: SQL Computer Programming for Beginners, Python, Kali Linux, Hacking with Kali Linux. Learn Coding Languages 2020.
- Auteur(s): Anthony Hack
- Narrateur(s): Jordan Gunner, Robert Plank
- Durée: 15 h et 41 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Have you always been interested in the world of programming? If you want to learn the programming languages for beginners or the professional hacking techniques, then this is the perfect audiobook for you. This audiobook includes: SQL Computer Programming for Beginners, Python for Beginners, Kali Linux and Hacking with Kali Linux.
-
Programming for Beginners
- This Book Includes: SQL Computer Programming for Beginners, Python, Kali Linux, Hacking with Kali Linux. Learn Coding Languages 2020.
- Narrateur(s): Jordan Gunner, Robert Plank
- Durée: 15 h et 41 min
- Date de publication: 2020-09-18
- Langue: Anglais
-
Have you always been interested in the world of programming? If you want to learn the programming languages for beginners or the professional hacking techniques, then this is the perfect audiobook for you....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Alice and Bob Learn Application Security
- Auteur(s): Tanya Janca
- Narrateur(s): Tanya Janca
- Durée: 10 h et 42 min
- Version intégrale
-
Au global2
-
Performance1
-
Histoire1
Learn application security from the very start with this comprehensive and approachable guide. Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software development. This book covers all the basic subjects such as threat modeling and security testing, but also dives deep into more complex and advanced topics for securing modern software systems and architectures.
-
-
Changing the way we build software
- Écrit par Audiobook-Enthusiast le 2025-11-20
-
Alice and Bob Learn Application Security
- Narrateur(s): Tanya Janca
- Durée: 10 h et 42 min
- Date de publication: 2021-07-27
- Langue: Anglais
-
Learn application security from the very start with this comprehensive and approachable guide. Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate the best security practices in software development.....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Amazon Web Services in Action
- Auteur(s): Andreas Wittig, Michael Wittig
- Narrateur(s): Aiden Humphreys
- Durée: 9 h et 55 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Amazon Web Services in Action introduces you to computing, storing, and networking in the AWS cloud. The audiobook will teach you about the most important services on AWS. You will also learn about best practices regarding security, high availability, and scalability.
-
Amazon Web Services in Action
- Narrateur(s): Aiden Humphreys
- Durée: 9 h et 55 min
- Date de publication: 2018-12-12
- Langue: Anglais
-
Amazon Web Services in Action introduces you to computing, storing, and networking in the AWS cloud. The audiobook will teach you about the most important services on AWS. You will also learn about best practices regarding security, high availability, and scalability....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Improving Security of Open Source Software in Operational Technology and Industrial Control Systems
- Auteur(s): CISA FBI NSA Department of Treasury
- Narrateur(s): Tom Brooks
- Durée: 2 h et 28 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This fact sheet will assist with better management of risk from OSS use in OT products and increase resilience using available resources. While several resources and recommendations within this fact sheet are best suited for execution by the vendor or the critical infrastructure owner, collaboration across parties will result in less friction for operator workflows and promote a safer, more reliable system and provision of National Critical Functions.
-
Improving Security of Open Source Software in Operational Technology and Industrial Control Systems
- Narrateur(s): Tom Brooks
- Durée: 2 h et 28 min
- Date de publication: 2023-10-25
- Langue: Anglais
-
This fact sheet will assist with better management of risk from OSS use in OT products and increase resilience using available resources....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Secure Vibe Coding Handbook
- A Practical Guide to Safe and Secure AI Programming
- Auteur(s): Taimur Ijlal
- Narrateur(s): Zachary Gandy
- Durée: 2 h et 12 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Secure Vibe Coding Handbook by Taimur Ijlal is the essential guide you've been waiting for. Imagine building tools, scripts, and SaaS products at 10x the speed, without sacrificing your security principles. This book is your blueprint for surviving-and thriving-in the age of vibe coding. Written by Taimur Ijlal, a 20-year cybersecurity veteran and AI security educator, The Secure Vibe Coding Handbook gives you the knowledge, mindset, and frameworks you need to stay secure, fast, and future-ready.
-
The Secure Vibe Coding Handbook
- A Practical Guide to Safe and Secure AI Programming
- Narrateur(s): Zachary Gandy
- Durée: 2 h et 12 min
- Date de publication: 2025-08-20
- Langue: Anglais
-
The Secure Vibe Coding Handbook by Taimur Ijlal is the essential guide you've been waiting for. Imagine building tools, scripts, and SaaS products at 10x the speed, without sacrificing your security principles. This book is your blueprint for surviving-and thriving-in the age of vibe coding.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Spring in Action: Covers Spring 4
- Auteur(s): Craig Walls
- Narrateur(s): Mark Thomas
- Durée: 20 h et 7 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Spring in Action, Fourth Edition is a hands-on guide to the Spring Framework, updated for version 4. It covers the features, tools, and practices including Spring MVC, REST, Security, Web Flow, and more. You'll move between short snippets and an ongoing example as you learn to build simple and efficient J2EE applications. Author Craig Walls has a special knack for crisp and entertaining examples that zoom in on the features and techniques you really need.
-
Spring in Action: Covers Spring 4
- Narrateur(s): Mark Thomas
- Durée: 20 h et 7 min
- Date de publication: 2018-11-29
- Langue: Anglais
-
Spring in Action, Fourth Edition is a hands-on guide to the Spring Framework, updated for version 4. It covers the features, tools, and practices including Spring MVC, REST, Security, Web Flow, and more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
37,53 $ ou gratuit avec l'essai de 30 jours
-
-
-
The CISA Tips On: Guide to Securing Remote Access Software
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 53 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Remote access software and tools comprise a broad array of capabilities used to maintain and improve IT, operational technology (OT), and industrial control systems (ICS) services; they allow a proactive and flexible approach for organizations to remotely oversee networks, computers, and other devices.
-
The CISA Tips On: Guide to Securing Remote Access Software
- Narrateur(s): Tom Brooks
- Durée: 1 h et 53 min
- Date de publication: 2023-06-22
- Langue: Anglais
-
Remote access software and tools comprise a broad array of capabilities used to maintain and improve IT, operational technology (OT), and industrial control systems (ICS) services....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking and Raspberry Pi 2
- Auteur(s): Solis Tech
- Narrateur(s): Millian Quinteros
- Durée: 2 h et 48 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught? Purchase Hacking to discover everything you need to know about hacking.
-
Hacking and Raspberry Pi 2
- Narrateur(s): Millian Quinteros
- Durée: 2 h et 48 min
- Date de publication: 2016-04-04
- Langue: Anglais
- Purchase Hacking to discover everything you need to know about hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Tips: Recommendations for Software Bill of Materials (SBOM) Management
- Auteur(s): National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 12 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The dramatic increase in cyber compromises over the past five years, specifically of software supply chains, prompted intense scrutiny of measures to strengthen the resilience of supply chains for software used throughout government and critical infrastructure. Several policies and working groups at multiple levels within the U.S. Government focus on this need to ensure the authenticity, integrity, and trustworthiness of software products.
-
Tips: Recommendations for Software Bill of Materials (SBOM) Management
- Narrateur(s): Tom Brooks
- Durée: 2 h et 12 min
- Date de publication: 2024-01-11
- Langue: Anglais
-
The dramatic increase in cyber compromises over the past five years, specifically of software supply chains, prompted intense scrutiny of measures to strengthen the resilience of supply chains for software....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Classroom-To-Go Training Course 1
- Managing Users, Computers, and Groups [Windows Server 2003 Edition]
- Auteur(s): William Stanek
- Narrateur(s): Ron Knowles
- Durée: 1 h et 51 min
- Version abrégée
-
Au global0
-
Performance0
-
Histoire0
Written by the premier author in Windows administration, William Stanek, and addressing the needs of Windows 2003 administrators and support staff, Classroom-To-Go Training Course for Managing Users, Computers, and Groups is designed to help you build your knowledge of Windows Server 2003.
-
Classroom-To-Go Training Course 1
- Managing Users, Computers, and Groups [Windows Server 2003 Edition]
- Narrateur(s): Ron Knowles
- Durée: 1 h et 51 min
- Date de publication: 2006-11-02
- Langue: Anglais
- Classroom-To-Go Training Course for Managing and Maintaining a Server Environment is designed to help you build your knowledge of Windows Server 2003....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
13,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking
- What Every Beginner Needs to Know
- Auteur(s): Mark Anderson
- Narrateur(s): Trevor Carleen
- Durée: 1 h et 30 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Have you watched the news lately? They can't stop talking about hacking. It is portrayed in movies, shouted about in media headlines, and typically gets a lot of attention. In fact, in the run up to the 2016 US Presidential election, there were allegations made nearly every day that the Russians were influencing the election by hacking into American databases and systems. And who can forget Julian Assange and his infamous WikiLeaks that successfully hacked into hundreds of thousands of emails, and whose actions may have kept Hillary Clinton out of the White House.
-
Hacking
- What Every Beginner Needs to Know
- Narrateur(s): Trevor Carleen
- Durée: 1 h et 30 min
- Date de publication: 2017-01-10
- Langue: Anglais
- Have you watched the news lately? They can't stop talking about hacking. It is portrayed in movies, shouted about in media headlines, and typically gets a lot of attention....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-