Code, Chips en Controle (Nederlandse Editie) + Code, Chips and Control
Code, Chips en Controle (Nederlandse Editie) + Code, Chips and Control
About the Bundle
About the Books
Code, Chips en Controle (Nederlandse Editie)
De Beveiligingshouding van Digitale Isolatie
Leer cyberbeveiliging aan de hand van de top 100 hacks sinds 1985, door praktijkvoorbeelden van wat er mis ging om ons te overtuigen van "best practices". Dit is het cyberbeveiligingsboek om het moderne tijdperk van digitale verdediging te begrijpen, en de hacks die dit mogelijk maakten.
Van de spoken van Spectre en Meltdown tot de schimmige toeleveringsketens achter moderne halfgeleiders, het verhaal van computerinfrastructuur zit vol met verontrustende inbraken en spookachtige kwetsbaarheden die niet tot rust willen komen. Dit is een boek dat deze momenten vertraagt en ons laat zien hoe we moeten nadenken over het opbouwen van dreigingsmodellen met isolatie in gedachten, van hardware tot runtime, van datacenters tot satellieten.
We doorlopen dit in een volgorde die rekening houdt met hoe beveiligingsdreigingsmodellen op elk niveau werken, en welke aanvallen door de tijd heen gebruik hebben gemaakt van de hiaten in hun dreigingsmodellen. We beginnen met hoe de wereld chips bouwt, en historische hardware-kwetsbaarheden. Daarna bespreken we de evolutie van beveiligingsbewijzen en ontsluiten we de kracht van zero-trust architectuur. Vervolgens krijgen we inzicht in de politiek en tijdsdruk van de dagen die van invloed zijn geweest op gecoördineerde openbaarmaking van zero-day gebeurtenissen in het verleden, om te zien hoe we deze kunnen verbeteren voor de toekomst. En daarna? We kijken naar chips die naar het einde van het universum gaan om veilig en veerkrachtig te zijn wanneer de meest waarschijnlijke tegenstander kosmische straling is. Het is een wilde rit, doe mee:
Hoofdstuk Een: De oorsprong en Evolutie van Halfgeleidertechnologie en Architectuur
Hoofdstuk Twee: Kernels: Architectuur, Beveiliging en Governance
Hoofdstuk Drie: Het Spook van Kwetsbaarheid
Hoofdstuk Vier: Embedded Systemen in de Apparaten om Ons Heen
Hoofdstuk Vijf: Openbaarmakingsdiplomatie: Kwetsbaarheden en Beveiligingsbelangen
Hoofdstuk Zes: De Toren van Babel en Weten Wat We Weten
Hoofdstuk Zeven: Hypervisors en de Politiek van Virtualisatie
Hoofdstuk Acht: Chips aan de Rand van het Universum
Code, Chips and Control
The Security Posture of Digital Isolation
Through the lens of the top 100 hacks since 1985, learn cybersecurity through real-world examples of what went wrong to convince us of “best practices". This is the cybersecurity book to understand the modern moment of digital defense, and the hacks that made it happen.
From the ghosts of Spectre and Meltdown to the shadowy supply chains behind modern semiconductors, the story of compute infrastructure is full of haunting breaches and spectral vulnerabilities that refuse to rest in peace. This is a book that slows those moments down and shows us how to think about how we build threat models with isolation in mind from hardware to runtime, from data centers to satellites.
We go through in the order that considers how security threat models work at every level, and what attacks enjoyed exploiting the gaps in their threat models over time. We start with how the world builds chips, and historical hardware level vulnerabilities. Then we’ll chat about the evolution of security proofs, and unlock the power of zero-trust architecture. Then we get to understand the politics and time pressure of the days that have affected coordinated discloser of a zero-day events in the past to see how improve them for the future. After that? We look at chips to go to the end of the universe to be secure and resilient when the most likely adversary is cosmic radiation. It’s a wild ride, join in:
Chapter One: The origins and Evolution of Semiconductor Technology and Architecture
Chapter Two: Kernels: Architecture, Security and Governance
Chapter Three: The Spectre of Vulnerability
Chapter Four: Embedded Systems in the Devices Around Us
Chapter Five: Disclosure Diplomacy: Vulnerabilities and Security Interests
Chapter Six: The Babylon Tower and Knowing What We Know
Chapter Seven: Hypervisors and the Politics of Virtualisation
Chapter Eight: Chips at the Edge of the Universe
The Leanpub 60 Day 100% Happiness Guarantee
Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
Now, this is technically risky for us, since you'll have the book or course files either way. But we're so confident in our products and services, and in our authors and readers, that we're happy to offer a full money back guarantee for everything we sell.
You can only find out how good something is by trying it, and because of our 100% money back guarantee there's literally no risk to do so!
So, there's no reason not to click the Add to Cart button, is there?
See full terms...
Earn $8 on a $10 Purchase, and $16 on a $20 Purchase
We pay 80% royalties on purchases of $7.99 or more, and 80% royalties minus a 50 cent flat fee on purchases between $0.99 and $7.98. You earn $8 on a $10 sale, and $16 on a $20 sale. So, if we sell 5000 non-refunded copies of your book for $20, you'll earn $80,000.
(Yes, some authors have already earned much more than that on Leanpub.)
In fact, authors have earnedover $14 millionwriting, publishing and selling on Leanpub.
Learn more about writing on Leanpub
Free Updates. DRM Free.
If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).
Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.
Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.
Learn more about Leanpub's ebook formats and where to read them