Alice and Bob Learn Application Security
If you like book Alice and Bob Learn Application Security here is the list of books you may also like
Buy this book on AmazonSimilar books (20)
-
Tidy First?: A Personal Exercise in Empirical Software Design
Messy code is a nuisance. "Tidying" code, to make it more readable, requires breaking it up into manageable sections. In this practical guide, author Kent Beck, creator of Extreme Programming and pion…
Buy this book on Amazon -
-
The Pragmatic Programmer: From Journeyman to Master
Straight from the programming trenches, The Pragmatic Programmer cuts through the increasing specialization and technicalities of modern software development to examine the core process--taking a …
Buy this book on Amazon -
Project Zero Trust: A Story about a Strategy for Aligning Security and the Business (Wiley Tax Library)
Implement Zero Trust initiatives efficiently and effectively
Buy this book on Amazon
In Project Zero A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern Methodist… -
-
-
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back
It’s not just computers―hacking is everywhere.
Buy this book on Amazon
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about y… -
Thinking In Systems: A Primer
Meadows’ Thinking in Systems, is a concise and crucial book offering insight for problem solving on scales ranging from the personal to the global. Edited by the Sustainability Institute’s Diana Wrigh…
Buy this book on Amazon -
The Programmer's Brain
Your brain responds in a predictable way when it encounters new or difficult tasks. This unique book teaches you concrete techniques rooted in cognitive science that will improve the way you learn and…
Buy this book on Amazon -
-
Bug Bounty Bootcamp
Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You'll also learn how …
Buy this book on Amazon -
-
-
Code: The Hidden Language of Computer Hardware and Software
What do flashlights, the British invasion, black cats, and seesaws have to do with computers? In CODE, they show us the ingenious ways we manipulate language and invent new means of communicating with…
Buy this book on Amazon -
-
Engineering Management for the Rest of Us
A lot of Engineering Managers and leaders studied for years and years to become the best Engineer they possibly could be... and then they were promoted. It can be very tough for those of us who didn't…
Buy this book on Amazon -
-
Accelerate: Building and Scaling High Performing Technology Organizations
Does technology actually matter? And how can we apply technology to drive business value? For years, we've been told that the performance of software delivery teams doesn't matter—that it can't provid…
Buy this book on Amazon -
So Good They Can't Ignore You: Why Skills Trump Passion in the Quest for Work You Love
In this eye-opening account, Cal Newport debunks the long-held belief that "follow your passion" is good advice.
Buy this book on Amazon
Not only is the cliché flawed—preexisting passions are rare and have little to do with … -
Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug d…
Buy this book on Amazon