Security principles for the working architect:
"The security community has developed a well-understood set of principles used to build systems that are secure (or at least securable) by design, but this topic often isn't included in the training of software developers, who assume that it's only relevant to security specialists. Ev...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch Video |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
O'Reilly Media
2019
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/0636920338215/?ar |
Zusammenfassung: | "The security community has developed a well-understood set of principles used to build systems that are secure (or at least securable) by design, but this topic often isn't included in the training of software developers, who assume that it's only relevant to security specialists. Even when principles are explained, they're often shrouded in the jargon of the security engineering community, and so mainstream developers struggle to understand and apply them. Eoin Woods (Endava) explains why secure design matters and then introduces a set of 10 of the most important proven principles for designing secure systems, distilled from the wisdom of the security engineering community. He discusses each principle in the context of mainstream system design, rather than in the specialized language of security engineering, focusing on how it's applied in practice to improve security. This session was recorded at the 2019 O'Reilly Software Architecture Conference in New York."--Resource description page |
Beschreibung: | Title from title screen (viewed December 12, 2019) |
Umfang: | 1 Online-Ressource (1 streaming video file (51 min., 11 sec.)) |
Internformat
MARC
LEADER | 00000cgm a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-048599611 | ||
003 | DE-627-1 | ||
005 | 20240228120936.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 191206s2019 xx ||| |o o ||eng c | ||
035 | |a (DE-627-1)048599611 | ||
035 | |a (DE-599)KEP048599611 | ||
035 | |a (ORHE)0636920338215 | ||
035 | |a (DE-627-1)048599611 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Woods, Eoin |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Security principles for the working architect |c Eoin Woods |
264 | 1 | |a [Place of publication not identified] |b O'Reilly Media |c 2019 | |
264 | 4 | |c ©2019 | |
300 | |a 1 Online-Ressource (1 streaming video file (51 min., 11 sec.)) | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Title from title screen (viewed December 12, 2019) | ||
520 | |a "The security community has developed a well-understood set of principles used to build systems that are secure (or at least securable) by design, but this topic often isn't included in the training of software developers, who assume that it's only relevant to security specialists. Even when principles are explained, they're often shrouded in the jargon of the security engineering community, and so mainstream developers struggle to understand and apply them. Eoin Woods (Endava) explains why secure design matters and then introduces a set of 10 of the most important proven principles for designing secure systems, distilled from the wisdom of the security engineering community. He discusses each principle in the context of mainstream system design, rather than in the specialized language of security engineering, focusing on how it's applied in practice to improve security. This session was recorded at the 2019 O'Reilly Software Architecture Conference in New York."--Resource description page | ||
650 | 0 | |a Software architecture | |
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Architecture logicielle | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Computer networks ; Security measures |0 (OCoLC)fst00872341 | |
650 | 4 | |a Computer security |0 (OCoLC)fst00872484 | |
650 | 4 | |a Software architecture |0 (OCoLC)fst01200416 | |
650 | 4 | |a Electronic videos | |
710 | 2 | |a O'Reilly & Associates, |e Verlag |4 pbl | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/0636920338215/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-048599611 |
---|---|
_version_ | 1821494948147494912 |
adam_text | |
any_adam_object | |
author | Woods, Eoin |
author_facet | Woods, Eoin |
author_role | aut |
author_sort | Woods, Eoin |
author_variant | e w ew |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)048599611 (DE-599)KEP048599611 (ORHE)0636920338215 |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02719cgm a22004812 4500</leader><controlfield tag="001">ZDB-30-ORH-048599611</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120936.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191206s2019 xx ||| |o o ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048599611</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP048599611</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0636920338215</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048599611</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Woods, Eoin</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security principles for the working architect</subfield><subfield code="c">Eoin Woods</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">O'Reilly Media</subfield><subfield code="c">2019</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 streaming video file (51 min., 11 sec.))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from title screen (viewed December 12, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"The security community has developed a well-understood set of principles used to build systems that are secure (or at least securable) by design, but this topic often isn't included in the training of software developers, who assume that it's only relevant to security specialists. Even when principles are explained, they're often shrouded in the jargon of the security engineering community, and so mainstream developers struggle to understand and apply them. Eoin Woods (Endava) explains why secure design matters and then introduces a set of 10 of the most important proven principles for designing secure systems, distilled from the wisdom of the security engineering community. He discusses each principle in the context of mainstream system design, rather than in the specialized language of security engineering, focusing on how it's applied in practice to improve security. This session was recorded at the 2019 O'Reilly Software Architecture Conference in New York."--Resource description page</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Software architecture</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Architecture logicielle</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield><subfield code="0">(OCoLC)fst00872341</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="0">(OCoLC)fst00872484</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software architecture</subfield><subfield code="0">(OCoLC)fst01200416</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic videos</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">O'Reilly & Associates,</subfield><subfield code="e">Verlag</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0636920338215/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-048599611 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:29Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 streaming video file (51 min., 11 sec.)) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | O'Reilly Media |
record_format | marc |
spelling | Woods, Eoin VerfasserIn aut Security principles for the working architect Eoin Woods [Place of publication not identified] O'Reilly Media 2019 ©2019 1 Online-Ressource (1 streaming video file (51 min., 11 sec.)) zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Title from title screen (viewed December 12, 2019) "The security community has developed a well-understood set of principles used to build systems that are secure (or at least securable) by design, but this topic often isn't included in the training of software developers, who assume that it's only relevant to security specialists. Even when principles are explained, they're often shrouded in the jargon of the security engineering community, and so mainstream developers struggle to understand and apply them. Eoin Woods (Endava) explains why secure design matters and then introduces a set of 10 of the most important proven principles for designing secure systems, distilled from the wisdom of the security engineering community. He discusses each principle in the context of mainstream system design, rather than in the specialized language of security engineering, focusing on how it's applied in practice to improve security. This session was recorded at the 2019 O'Reilly Software Architecture Conference in New York."--Resource description page Software architecture Computer security Computer networks Security measures Computer Security Architecture logicielle Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures (OCoLC)fst00872341 Computer security (OCoLC)fst00872484 Software architecture (OCoLC)fst01200416 Electronic videos O'Reilly & Associates, Verlag pbl |
spellingShingle | Woods, Eoin Security principles for the working architect Software architecture Computer security Computer networks Security measures Computer Security Architecture logicielle Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures (OCoLC)fst00872341 Computer security (OCoLC)fst00872484 Software architecture (OCoLC)fst01200416 Electronic videos |
subject_GND | (OCoLC)fst00872341 (OCoLC)fst00872484 (OCoLC)fst01200416 |
title | Security principles for the working architect |
title_auth | Security principles for the working architect |
title_exact_search | Security principles for the working architect |
title_full | Security principles for the working architect Eoin Woods |
title_fullStr | Security principles for the working architect Eoin Woods |
title_full_unstemmed | Security principles for the working architect Eoin Woods |
title_short | Security principles for the working architect |
title_sort | security principles for the working architect |
topic | Software architecture Computer security Computer networks Security measures Computer Security Architecture logicielle Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures (OCoLC)fst00872341 Computer security (OCoLC)fst00872484 Software architecture (OCoLC)fst01200416 Electronic videos |
topic_facet | Software architecture Computer security Computer networks Security measures Computer Security Architecture logicielle Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Electronic videos |
work_keys_str_mv | AT woodseoin securityprinciplesfortheworkingarchitect AT oreillyassociates securityprinciplesfortheworkingarchitect |