Kirjojen hintavertailu. Mukana 11 717 486 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

5 kirjaa tekijältä Derek Fisher

Alicia Connected

Alicia Connected

Derek Fisher

IngramSpark
2021
pokkari
Halloween is here, and it is Alicia's favorite time of year. What's not to like about dressing up in a costume and getting free candy? But there is something even more exciting happening this year. For the first time, Alicia and her friends are throwing a virtual party in TullyTown Putting together a party in TullyTown isn't easy, and Alicia and her friends want to do the best they can to make sure it is enjoyed by plenty of avatars in TullyTown. For one of Alicia's friends, getting ready to throw a TullyTown party leads to looking for easy treats. But what if it's a trick?Alicia has been using her tablet for a while and is getting more used to how to use the technology. However, there is always something new for her and her friends to learn.
Alicia Connected

Alicia Connected

Derek Fisher

Securely Built
2021
pokkari
Alicia has finally entered a new world of technology when her parents give her a tablet for her birthday. She has seen the many uses of this technology through her friends as they access apps and games that Alicia has yet to experience. Until now. But using such technology can bring a set of challenges that are new to both Alicia and her parents. Understanding the different apps and games and how to use them properly can be tricky. Will Alicia know how to use it in a way that is fun and allows her to connect with her friends while being safe? Will she be able to avoid some of the more problematic interactions while using this technology? Both her and her parents learn how to provide a safe and fun environment for Alicia as she jumps headfirst into using technology
Alcia Connected

Alcia Connected

Derek Fisher

IngramSpark
2023
pokkari
Alicia is excited to go on a long weekend trip with her parents to a house on a lake. They all can't wait to see what is in store for them as they enjoy some time on the water and hiking in the woods. Before they pack their bags Alicia has a few days at school full of challenges and even a few lessons about responsibility when one of her friends' loses their phone Alicia and her friends also learn that not everything you hear can be trusted as a rumor spreads like wildfire through the school bus one morning. The friends are shocked to find out that some of the information that is online, isn't always true. With the help of her parents, Alicia sets out to investigate the rumor and determine the truth. Through this, she learns about the dangers of fake news and the importance of fact-checking.When Alicia and her parents take their long-awaited trip, they enjoy all that nature can offer. Even better, they are able to combine nature and technology by doing one of Alicia's favorite activities. Geocaching But when they return home from the fun-filled weekend, Alicia discovers that she has a cyberstalker. While Alicia is able to navigate the situation with her parents, one of her friends has to find a way to protect herself from a similar problem. Luckily, the friends are able to come together to learn how to protect themselves from these dangers online.In the third and final book in the Alicia Connected series, the friends learn about different types of online threats and how to stay safe on the internet. They also discover the importance of device responsibility, taking a break from being online, and being able to identify false information online.
Application Security Program Handbook

Application Security Program Handbook

Derek Fisher

Manning Publications
2023
nidottu
Stop dangerous threats and secure your vulnerabilities without slowing down delivery. This practical book is a one-stop guide to implementing a robust application security program.Application Security Program Handbook teaches you to implement a robust program of security throughout your development process. It goes well beyond the basics, detailing a flexible approach that can adapt and evolve to new and emerging threats. Follow the expert advice in this guide and you'll reliably deliver software that is free from security defects and critical vulnerabilities. As a developer, you must build security into your software throughout its development lifecycle. This book addresses all the practices, tools, technology, people, and processes you need to reduce the risk of attacks and vulnerabilities in your software. Application Security Program Handbook is full of strategies for setting up and maturing a security program for your development process. Its realistic recommendations take a service-oriented approach to application security that's perfectly suited to the fast-pace of modern development. Focused on the realities of software development, it shows you how to avoid making security a gated exercise.Inside, you'll learn to assess the current state of your app's security, identify key risks to your organization, and measure the success of any defensive programs you deploy. You'll master common methodologies and practices that help safeguard your software, along with defensive tools you can use to keep your apps safe. With this handy reference guide by your side, you'll be able to implement reliable security in a way that doesn't impact your delivery speed. RETAIL SELLING POINTS Application security tools you can use throughout the development lifecycle Creating threat models Mitigating web app vulnerabilities Creating a DevSecOps pipeline Application security as a service model Reporting structures that highlight the value of application security Creating a software security ecosystem that benefits development AUDIENCE For software developers, architects, team leaders, and project managers looking to implement security in their pipelines.
Threat Modeling Best Practices

Threat Modeling Best Practices

Derek Fisher

PACKT PUBLISHING LIMITED
2025
nidottu
Build threat modeling skills with practical advanced techniques to enhance risk analysis, optimize security measures, and stay ahead of emerging threats in the complex cybersecurity landscape Free with your book: DRM-free PDF version + access to Packt's next-gen Reader* Key Features Identify and mitigate security threats across software, cloud, mobile, IoT, and supply chains using STRIDE, PASTA, and MITRE ATT&CK Learn from real-world case studies showing practical threat modeling applications across industries Build threat modeling programs with the right team, tools, SDLC integration, and continuous improvement Book DescriptionThreat modeling has become a cornerstone of modern cybersecurity, yet it is often overlooked, leaving security gaps that attackers can exploit. With the rise in system complexity, cloud adoption, AI-driven threats, and stricter compliance requirements, security teams need a structured approach to proactively spot and stop risks before attackers do. This book delivers exactly that, offering actionable insights for applying industry best practices and emerging technologies to secure systems. It breaks down the fundamentals of threat modeling and walks you through key frameworks and tools such as STRIDE, MITRE ATT&CK, PyTM, and Attack Paths, helping you choose the right model and create a roadmap tailored to your business. You'll learn how to use leading threat modeling tools, identify and prioritize potential threats, and integrate these practices into the software development life cycle to detect risks early. The book also examines how AI can enhance analysis and streamline security decision-making for faster, stronger defenses. By the end, you'll have everything you need to build systems that anticipate and withstand evolving threats, keeping your organization secure in an ever-changing digital landscape. *Email sign-up and proof of purchase requiredWhat you will learn Create foundational threat modeling artifacts like Data Flow Diagrams and security architecture diagrams to visualize system threats Understand the relationship between vulnerabilities (exploitable weaknesses) and threats (sources of harm) Analyze real-world case studies to see how threat modeling is applied in industry incidents Evaluate and compare popular threat modeling tools, both open source and commercial Explore advanced topics, including threat modeling for cloud environments and integrating with DevSecOps Who this book is forThis book is for cybersecurity professionals, security consultants, penetration testers, and compliance managers seeking to integrate threat modeling into their assessment methodologies and client engagements. It’s also ideal for software architects, DevOps engineers, risk managers, and organizational leaders responsible for identifying, assessing, and mitigating security risks in their technological environments. Whether you’re new to threat modeling or looking to enhance your existing expertise, this book helps you with foundational knowledge as well as advanced techniques.