Remove 2002 Remove Authentication Remove Security Remove Software Development
article thumbnail

14 essential book recommendations by and for IT leaders

CIO Business Intelligence

This book is mind-bending because it translates the complex theories behind the socio-technical aspects of software development and delivery into a set of easy-to-understand patterns. In the book, Willink and Babin write of being sent to Ramadi, Iraq — a violent war zone at the time — to secure the city.

Devops 130
article thumbnail

The Hacker Mind Podcast: What Star Wars Can Teach Us About Threat Modeling

ForAllSecure

that uses both Star Wars and STRIDE to help engineers under vulnerabilities and threats in software development. Having a common framework around vulnerabilities, around threats , helps us understand the information security landscape better. He’s the author of the acclaimed Threat Modeling: Designing for Security.