Hören und Lesen

Tritt ein in eine Welt voller Geschichten

  • Mehr als 600.000 Hörbücher und E-Book
  • Jederzeit kündbar
  • Exklusive Titel und Originals
  • komfortabler Kinder-Modus
Abonniere jetzt
se-device-image-1200x1200

Hackable: How to Do Application Security Right

1 Bewertungen

5

Dauer
5h 49m
Sprache
Englisch
Format
Kategorie

Sachbuch

If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too.

Whether you're a technology executive, developer, or security professional, you are responsible for securing your application. However, you may be uncertain about what works, what doesn't, how hackers exploit applications, or how much to spend. Or maybe you think you do know, but don't realize what you're doing wrong.

To defend against attackers, you must think like them. As a leader of ethical hackers, Ted Harrington helps the world's foremost companies secure their technology. Hackable teaches you exactly how. You'll learn how to eradicate security vulnerabilities, establish a threat model, and build security into the development process. You'll build better, more secure products. You'll gain a competitive edge, earn trust, and win sales.

© 2021 Ted Harrington (Hörbuch): 9781662296826

Erscheinungsdatum

Hörbuch: 10. Juni 2021

Anderen gefällt...

  1. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
  2. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
  3. Targeted: My Inside Story of Cambridge Analytica and How Trump, Brexit and Facebook Broke Democracy Brittany Kaiser
  4. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  5. Alice and Bob Learn Application Security Tanya Janca
  6. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
  7. Cybersecutity First Principles Rick Howard
  8. Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
  9. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  10. Data Science John D. Kelleher
  11. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  12. Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Eric Cole
  13. Pegasus: The Story of the World's Most Dangerous Spyware Laurent Richard
  14. Dark Data: Why What You Don't Know Matters David J. Hand
  15. Cryptography: A Very Short Introduction Sean Murphy
  16. Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Ben Malisow
  17. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
  18. What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
  19. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
  20. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  21. Unmasking the Social Engineer: The Human Element of Security Paul Ekman
  22. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  23. Liars and Outliers: Enabling the Trust that Society Needs to Thrive Bruce Schneier
  24. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  25. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  26. Cyberdeterrence and Cyberwar Martin C. Libicki
  27. Schneier on Security Bruce Schneier
  28. Cybersecurity For Dummies Joseph Steinberg
  29. We Have Root: Even More Advice from Schneier on Security Bruce Schneier
  30. Social Engineering: The Art of Human Hacking Christopher Hadnagy
  31. Cybersecurity: The Insights You Need from Harvard Business Review Boris Groysberg
  32. Project Zero Trust: A Story about a Strategy for Aligning Security and the Business George Finney
  33. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
  34. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  35. The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Perry Carpenter
  36. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  37. If It's Smart, It's Vulnerable Mikko Hypponen
  38. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  39. The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
  40. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  41. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
  42. Biggest Cyber Crimes in the History Introbooks Team
  43. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  44. Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 John Knowles
  45. The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
  1. Onyx Storm – Flammengeküsst (Flammengeküsst-Reihe 3): Die heißersehnte Fortsetzung von »Fourth Wing« und »Iron Flame« Rebecca Yarros
    4.3
  2. Iron Flame – Flammengeküsst (Flammengeküsst-Reihe 2): Die heißersehnte Fortsetzung des Fantasy-Erfolgs »Fourth Wing« Rebecca Yarros
    4.7
  3. Fourth Wing – Flammengeküsst (Flammengeküsst-Reihe 1) Rebecca Yarros
    4.8
  4. Dark Cinderella - Northern-Royals-Dilogie, Band 1 (Ungekürzte Lesung) Anya Omah
    4.5
  5. Credence – Sie ist tabu, doch Liebe kennt keine Regeln: Sinnliche Dark Romance von der TikTok-Lieblingsautorin des SPIEGEL-Bestsellers »Punk 57« endlich auf Deutsch! Penelope Douglas
    3.9
  6. Fake Dates and Fireworks: Fake Dating und Enemies-to-Lovers: In dieser sexy RomCom sprühen die Funken Kyra Groh
    4.4
  7. Belladonna 3: Wisteria: Die Liebe des Todes | Die #1 ›New York Times‹-Bestsellerreihe und TikTok-Sensation. Düster und romantisch! Adalyn Grace
    4.1
  8. Funkenstille - Sweet Lemon Agency, Teil 3 (Ungekürzt) Kyra Groh
    4.6
  9. Fearless - Chestnut Springs, Teil 4 (Ungekürzt) Elsie Silver
    4.6
  10. The Veiled Kingdom (Die Veiled-Kingdom-Serie 1): Knisternde Enemies-to-Lovers Romantasy voller Geheimnisse mit einer verbotenen Liebe Holly Renee
    3.6
  11. "Mama, bitte lern Deutsch" - Unser Eingliederungsversuch in eine geschlossene Gesellschaft (Ungekürzte Autorenlesung) Tahsim Durgun
    4.8
  12. Zwei Hexen und ein Whiskey - Guild Codex: Spellbound, Band 3 (Ungekürzte Lesung) Annette Marie
    4.6
  13. Boys of Tommen 4: Redeeming 6: Die BookTok Sensation endlich auf Deutsch! Chloe Walsh
    4.8
  14. Fame Game Anna Rush
    4.4
  15. Achtsame Ermittlungen - Bunburry - Ein Idyll zum Sterben, Folge 18 (Ungekürzt) Helena Marchmont
    4.4

Wähle dein Abo-Modell

  • Über 600.000 Titel

  • Lade Titel herunter mit dem Offline Modus

  • Exklusive Titel und Storytel Originals

  • Sicher für Kinder (Kindermodus)

  • Einfach jederzeit kündbar

Am beliebtesten!

Unlimited

Für alle, die unbegrenzt hören und lesen möchten

18.90 € /Monat
7 Tage kostenlos
  • 1 Konto

  • Unbegrenzter Zugriff

  • Jederzeit kündbar

  • Wechsel zu Basic jederzeit möglich

Jetzt ausprobieren

Basic

Für alle, die gelegentlich hören und lesen.

7.90 € /Monat
7 Tage kostenlos
  • 1 Konto

  • 20 Stunden/pro Monat

  • Jederzeit kündbar

  • Abo-Upgrade jederzeit möglich

Jetzt ausprobieren