Hackable: How to Do Application Security Right

Hackable: How to Do Application Security Right

  • Downloads:4017
  • Type:Epub+TxT+PDF+Mobi
  • Create Date:2021-03-11 08:13:52
  • Update Date:2025-09-07
  • Status:finish
  • Author:Ted Harrington
  • ISBN:1544517661
  • Environment:PC/Android/iPhone/iPad/Kindle

Summary

If you don't fix your security vulnerabilities, attackers will exploit them。 It's simply a matter of who finds them first。 If you fail to prove that your software is secure, your sales are at risk too。

Whether you're a technology executive, developer, or security professional, you are responsible for securing your application。 However, you may be uncertain about what works, what doesn't, how hackers exploit applications, or how much to spend。 Or maybe you think you do know, but don't realize what you're doing wrong。

To defend against attackers, you must think like them。 As a leader of ethical hackers, Ted Harrington helps the world's foremost companies secure their technology。 Hackable teaches you exactly how。 You'll learn how to eradicate security vulnerabilities, establish a threat model, and build security into the development process。 You'll build better, more secure products。 You'll gain a competitive edge, earn trust, and win sales。

Download

Reviews

Paul

In this era of computer data breaches happening seemingly every week, computer security has become a very important subject。 This book, written by the head of a computer security company, gives the details。First, establish a partnership with an external computer security company。 Your internal IT people may be the best, but they can't do it all by themselves。 Most companies think that they need a penetration test, but what they really need is a vulnerability assessment。 A penetration test will a In this era of computer data breaches happening seemingly every week, computer security has become a very important subject。 This book, written by the head of a computer security company, gives the details。First, establish a partnership with an external computer security company。 Your internal IT people may be the best, but they can't do it all by themselves。 Most companies think that they need a penetration test, but what they really need is a vulnerability assessment。 A penetration test will answer a Yes/No question (Will X work in situation Y?), but a vulnerability assessment will go through your whole system, looking for problems。 You should absolutely give the external company a tour of your system, ahead of time。 You don't want them wasting their time, and your money, finding vulnerabilities that you already knew about。When you are presented with the list found vulnerabilities, whether it's a few or a lot, Fix Them, or get them fixed。 Prioritize those that have to be fixed today, and those that can wait。 After they are fixed, the external company needs to do a remediation test。 It is to make sure that the problems were fixed, and that fixing one problem didn't create several more problems。 The book says that there is no such thing as "perfect" security, or being "done" with security。 Internal files are moved, and internal settings are changed, every day, so new vulnerabilities may be created every day。 A vulnerability assessment needs to be done a couple of times per year。 How much do you not want to be the next corporate victim of a hacker attack? On your company website, have a separate page that talks all about computer security。 Explain exactly what you are doing; potential customers will be very interested。 Don't simply say "We guarantee the best computer security anywhere。"Computer security can be a very complex subject。 The author does an excellent job at making it understandable by the average person。 This book is full of information, and is very easy to read。 It is well worth the time。 。。。more