Building Secure and Reliable Systems Building Secure and Reliable Systems

Building Secure and Reliable Systems

Best Practices for Designing, Implementing, and Maintaining Systems

Heather Adkins والمزيد
    • ‏59٫99 US$
    • ‏59٫99 US$

وصف الناشر

Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best practices to help your organization design scalable and reliable systems that are fundamentally secure.

Two previous O’Reilly books from Google—Site Reliability Engineering and The Site Reliability Workbook—demonstrated how and why a commitment to the entire service lifecycle enables organizations to successfully build, deploy, monitor, and maintain software systems. In this latest guide, the authors offer insights into system design, implementation, and maintenance from practitioners who specialize in security and reliability. They also discuss how building and adopting their recommended best practices requires a culture that’s supportive of such change.

You’ll learn about secure and reliable systems through:
Design strategiesRecommendations for coding, testing, and debugging practicesStrategies to prepare for, respond to, and recover from incidentsCultural best practices that help teams across your organization collaborate effectively

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠٢٠
١٦ مارس
اللغة
EN
الإنجليزية
عدد الصفحات
٥٥٨
الناشر
O'Reilly Media
البائع
O Reilly Media, Inc.
الحجم
٧٫٨
‫م.ب.‬
CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002) CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002)
٢٠٢٠
CompTIA CySA+ Study Guide CompTIA CySA+ Study Guide
٢٠٢٣
CISSP All-in-One Exam Guide, Ninth Edition CISSP All-in-One Exam Guide, Ninth Edition
٢٠٢١
Threat Modeling Threat Modeling
٢٠١٤
Alice and Bob Learn Application Security Alice and Bob Learn Application Security
٢٠٢٠
Crafting the InfoSec Playbook Crafting the InfoSec Playbook
٢٠١٥