ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Security Chaos Engineering: Sustaining Resilience in Software and Systems

دانلود کتاب مهندسی آشوب امنیتی: پایداری انعطاف پذیری در نرم افزار و سیستم ها

Security Chaos Engineering: Sustaining Resilience in Software and Systems

مشخصات کتاب

Security Chaos Engineering: Sustaining Resilience in Software and Systems

ویرایش: [1 ed.] 
نویسندگان:   
سری:  
ISBN (شابک) : 1098113829, 9781098113827 
ناشر: O'Reilly Media 
سال نشر: 2023 
تعداد صفحات: 340 
زبان: English 
فرمت فایل : EPUB (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 8 Mb 

قیمت کتاب (تومان) : 32,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 6


در صورت تبدیل فایل کتاب Security Chaos Engineering: Sustaining Resilience in Software and Systems به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مهندسی آشوب امنیتی: پایداری انعطاف پذیری در نرم افزار و سیستم ها نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Preface
        Who Should Read This Book?
        Scope of This Book
            Outline of This Book
        Conventions Used in This Book
        O’Reilly Online Learning
        How to Contact Us
        Acknowledgments
    1. Resilience in Software and Systems
        What Is a Complex System?
            Variety Defines Complex Systems
            Complex Systems Are Adaptive
            The Holistic Nature of Complex Systems
        What Is Failure?
            Acute and Chronic Stressors in Complex Systems
            Surprises in Complex Systems
        What Is Resilience?
            Critical Functionality
            Safety Boundaries (Thresholds)
            Interactions Across Space-Time
            Feedback Loops and Learning Culture
            Flexibility and Openness to Change
        Resilience Is a Verb
        Resilience: Myth Versus Reality
            Myth: Robustness = Resilience
            Myth: We Can and Should Prevent Failure
            Myth: The Security of Each Component Adds Up to Resilience
            Myth: Creating a “Security Culture” Fixes Human Error
        Chapter Takeaways
    2. Systems-Oriented Security
        Mental Models of System Behavior
            How Attackers Exploit Our Mental Models
            Refining Our Mental Models
        Resilience Stress Testing
        The E&E Resilience Assessment Approach
        Evaluation: Tier 1 Assessment
            Mapping Flows to Critical Functionality
            Document Assumptions About Safety Boundaries
            Making Attacker Math Work for You
            Starting the Feedback Flywheel with Decision Trees
            Moving Toward Tier 2: Experimentation
        Experimentation: Tier 2 Assessment
            The Value of Experimental Evidence
            Sustaining Resilience Assessments
        Fail-Safe Versus Safe-to-Fail
            Uncertainty Versus Ambiguity
            Fail-Safe Neglects the Systems Perspective
            The Fragmented World of Fail-Safe
        SCE Versus Security Theater
            What Is Security Theater?
            How Does SCE Differ from Security Theater?
        How to RAVE Your Way to Resilience
            Repeatability: Handling Complexity
            Accessibility: Making Security Easier for Engineers
            Variability: Supporting Evolution
        Chapter Takeaways
    3. Architecting and Designing
        The Effort Investment Portfolio
            Allocating Your Effort Investment Portfolio
            Investing Effort Based on Local Context
        The Four Failure Modes Resulting from System Design
        The Two Key Axes of Resilient Design: Coupling and Complexity
            Designing to Preserve Possibilities
        Coupling in Complex Systems
            The Tight Coupling Trade-Off
            The Dangers of Tight Coupling: Taming the Forest
            Investing in Loose Coupling in Software Systems
            Chaos Experiments Expose Coupling
        Complexity in Complex Systems
            Understanding Complexity: Essential and Accidental
            Complexity and Mental Models
            Introducing Linearity into Our Systems
            Designing for Interactivity: Identity and Access Management
            Navigating Flawed Mental Models
        Chapter Takeaways
    4. Building and Delivering
        Mental Models When Developing Software
        Who Owns Application Security (and Resilience)?
            Lessons We Can Learn from Database Administration Going DevOps
        Decisions on Critical Functionality Before Building
            Defining System Goals and Guidelines on “What to Throw Out the Airlock”
            Code Reviews and Mental Models
            “Boring” Technology Is Resilient Technology
            Standardization of Raw Materials
        Developing and Delivering to Expand Safety Boundaries
            Anticipating Scale and SLOs
            Automating Security Checks via CI/CD
            Standardization of Patterns and Tools
            Dependency Analysis and Prioritizing Vulnerabilities
        Observe System Interactions Across Space-Time (or Make More Linear)
            Configuration as Code
            Fault Injection During Development
            Integration Tests, Load Tests, and Test Theater
            Beware Premature and Improper Abstractions
        Fostering Feedback Loops and Learning During Build and Deliver
            Test Automation
            Documenting Why and When
            Distributed Tracing and Logging
            Refining How Humans Interact with Build and Delivery Practices
        Flexibility and Willingness to Change
            Iteration to Mimic Evolution
            Modularity: Humanity’s Ancient Tool for Resilience
            Feature Flags and Dark Launches
            Preserving Possibilities for Refactoring: Typing
            The Strangler Fig Pattern
        Chapter Takeaways
    5. Operating and Observing
        What Does Operating and Observing Involve?
        Operational Goals in SCE
            The Overlap of SRE and Security
            Measuring Operational Success
            Crafting Success Metrics like Attackers
            The DORA Metrics
            SLOs, SLAs, and Principled Performance Analytics
            Embracing Confidence-Based Security
        Observability for Resilience and Security
            Thresholding to Uncover Safety Boundaries
            Attack Observability
        Scalable Is Safer
            Navigating Scalability
            Automating Away Toil
        Chapter Takeaways
    6. Responding and Recovering
        Responding to Surprises in Complex Systems
            Incident Response and the Effort Investment Portfolio
            Action Bias in Incident Response
            Practicing Response Activities
        Recovering from Surprises
            Blameless Culture
            Blaming Human Error
            Hindsight Bias and Outcome Bias
            The Just-World Hypothesis
            Neutral Practitioner Questions
        Chapter Takeaways
    7. Platform Resilience Engineering
        Production Pressures and How They Influence System Behavior
        What Is Platform Engineering?
        Defining a Vision
        Defining a User Problem
            Local Context Is Critical
            User Personas, Stories, and Journeys
            Understanding How Humans Make Trade-Offs Under Pressure
        Designing a Solution
            The Ice Cream Cone Hierarchy of Security Solutions
            System Design and Redesign to Eliminate Hazards
            Substitute Less Hazardous Methods or Materials
            Incorporate Safety Devices and Guards
            Provide Warning and Awareness Systems
            Apply Administrative Controls Including Guidelines and Training
            Two Paths: The Control Strategy or the Resilience Strategy
            Experimentation and Feedback Loops for Solution Design
        Implementing a Solution
            Fostering Consensus
            Planning for Migration
            Success Metrics
        Chapter Takeaways
    8. Security Chaos Experiments
        Lessons Learned from Early Adopters
            Lesson #1. Start in Nonproduction Environments; You Can Still Learn a Lot
            Lesson #2. Use Past Incidents as a Source of Experiments
            Lesson #3. Publish and Evangelize Experimental Findings
        Setting Experiments Up for Success
        Designing a Hypothesis
        Designing an Experiment
        Experiment Design Specifications
        Conducting Experiments
            Collecting Evidence
        Analyzing and Documenting Evidence
            Capturing Knowledge for Feedback Loops
            Document Experiment Release Notes
        Automating Experiments
        Easing into Chaos: Game Days
        Example Security Chaos Experiments
            Security Chaos Experiments for Production Infrastructure
            Security Chaos Experiments for Build Pipelines
            Security Chaos Experiments in Cloud Native Environments
            Security Chaos Experiments in Windows Environments
        Chapter Takeaways
    9. Security Chaos Engineering in the Wild
        Experience Report: The Existence of Order Through Chaos (UnitedHealth Group)
            The Story of ChaoSlingr
            Step-by-Step Example: PortSlingr
        Experience Report: A Quest for Stronger Reliability (Verizon)
            The Bigger They Are…
            All Hands on Deck Means No Hands on the Helm
            Assert Your Hypothesis
            Reliability Experiments
            Cost Experiments
            Performance Experiments
            Risk Experiments
            More Traditionally Known Experiments
            Changing the Paradigm to Continuous
            Lessons Learned
        Experience Report: Security Monitoring (OpenDoor)
        Experience Report: Applied Security (Cardinal Health)
            Building the SCE Culture
            The Mission of Applied Security
            The Method: Continuous Verification and Validation (CVV)
            The CVV Process Includes Four Steps
        Experience Report: Balancing Reliability and Security via SCE (Accenture Global)
            Our Roadmap to SCE Enterprise Capability
            Our Process for Adoption
        Experience Report: Cyber Chaos Engineering (Capital One)
            What Does All This Have to Do with SCE?
            What Is Secure Today May Not Be Secure Tomorrow
            How We Started
            How We Did This in Ye Olden Days
            Things I’ve Learned Along the Way
            A Reduction of Guesswork
            Driving Value
            Conclusion
        Chapter Takeaways
    Index
    About the Authors




نظرات کاربران