|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
OR_on1228516313 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
101120s2020 xx eo 000 0 eng d |
040 |
|
|
|a TOH
|b eng
|c TOH
|d OCLCO
|
020 |
|
|
|a 9781492080350
|
020 |
|
|
|a 1492080357
|
024 |
8 |
|
|a 9781492080350
|
029 |
1 |
|
|a AU@
|b 000068857688
|
029 |
1 |
|
|a AU@
|b 000073555255
|
035 |
|
|
|a (OCoLC)1228516313
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Rinehart, Aaron,
|e author.
|
245 |
1 |
0 |
|a Security Chaos Engineering /
|c Rinehart, Aaron.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b O'Reilly Media, Incorporated,
|c 2020.
|
300 |
|
|
|a 1 online resource (90 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
365 |
|
|
|b 74.99
|
520 |
|
|
|a Information security is broken. Users and customers continually entrust companies with vital information, and companies continually fail to maintain that trust. Year after year, the same attacks are successful. But the impact has become greater. Those who build, operate, and defend systems need to acknowledge that failure will happen. People will click on the wrong thing. The security implications of code changes won't be clear. Things will break. In this report, Aaron Rinehart and Kelly Shortridge explain how engineers can navigate security in this new frontier. You'll learn the guiding principles of security chaos engineering for harnessing experimentation and failure as tools for empowerment--and you'll understand how to transform security from a gatekeeper to a valued advisor. Case studies from Capital One and Cardinal Health are included. Apply chaos engineering and resilience engineering to securely deliver software and services Transform security into an innovative and collaborative engine for enhancing operational speed and stability Anticipate and identify security failure before it turns into an incident, outage, or breach Harness failure to continuously improve your security strategy Learn your systems' ability to handle security-relevant failures such as system exploitation and server failures Apply a series of controlled experiments in engineering testing processes.
|
542 |
|
|
|f Copyright © 2020 O'Reilly Media, Incorporated.
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
588 |
0 |
|
|a Online resource; Title from title page (viewed December 4, 2020).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
700 |
1 |
|
|a Shortridge, Kelly,
|e author.
|
710 |
2 |
|
|a O'Reilly for Higher Education (Firm),
|e distributor.
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781492080350/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|