veeral-patel / how-to-secure-anythingLinks
How to systematically secure anything: a repository about security engineering
☆10,143Updated 2 years ago
Alternatives and similar repositories for how-to-secure-anything
Users that are interested in how-to-secure-anything are comparing it to the libraries listed below
Sorting:
- Everything you need to prepare for your technical interview☆18,183Updated 8 months ago
- What happens behind the scenes when we type www.google.com in a browser?☆16,557Updated 2 years ago
- A curated collection of marketing articles & tools to grow your product.☆12,956Updated 4 years ago
- For when people get too hyped up about things☆7,296Updated last year
- Questions to ask the company during your interview☆28,338Updated 6 months ago
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).☆10,262Updated 9 months ago
- A list of amazing Newsletters☆4,201Updated last month
- 😱 Falsehoods Programmers Believe in☆26,270Updated 3 weeks ago
- An Open-Source Collection of Flash Cards to Help You Preparing Your Algorithms & Data Structures and System Design Interviews 💯☆5,767Updated last month
- A list of engineering manager resource links.☆10,660Updated 8 months ago
- Mega list of 1 on 1 meeting questions compiled from a variety to sources☆9,602Updated 2 years ago
- An evolving how-to guide for securing a Linux server.☆19,494Updated 10 months ago
- Useful sed scripts & patterns.☆3,562Updated 3 years ago
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,699Updated 3 years ago
- Dockerfile best-practices for writing production-worthy Docker images.☆4,089Updated 4 years ago
- Tools of The Trade, from Hacker News.☆16,826Updated last year
- A Big Picture, Thesaurus, and Taxonomy of Modern JavaScript Web Development☆17,551Updated last year
- Learn the skills required to sysadmin a remote Linux server from the commandline.☆3,404Updated 4 years ago
- Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with h…☆8,462Updated last week
- Checklist of the most important security countermeasures when designing, testing, and releasing your API☆23,027Updated 4 months ago
- A list of resources for those interested in getting started in bug bounties☆11,493Updated last year
- Things you can do with a browser in 2020 ☕️☆8,022Updated 3 years ago
- Berty is a secure peer-to-peer messaging app that works with or without internet access, cellular data or trust in the network☆8,422Updated this week
- Awesome online talks and screencasts☆6,179Updated 2 months ago
- Heuristics for effective management☆5,388Updated last year
- 🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024☆19,564Updated 2 months ago
- 🚀 Free resources you may use to promote your next startup☆2,162Updated last year
- A collection of public resources about how software companies test their software☆6,193Updated 8 months ago
- Collection of awesome podcasts☆12,653Updated last year
- 🧠 Laws, Theories, Principles and Patterns for developers and technologists.☆26,854Updated 2 months ago