Hacker News
- A collection of books, talks, and papers on security engineering https://github.com/veeral-patel/learn-security-engineering 8 comments
- Learn Security Engineering https://github.com/veeral-patel/learn-security-engineering 10 comments netsec
Linking pages
Linked pages
- Home | seL4 https://sel4.systems 502 comments
- http://ts.data61.csiro.au/publications/csiro_full_text/Biggs_LH_18.pdf 284 comments
- Air Gaps - Schneier on Security https://www.schneier.com/blog/archives/2013/10/air_gaps.html 196 comments
- Prometheus - Monitoring system & time series database https://prometheus.io/ 190 comments
- Shared/Defenders think in lists. Attackers think in graphs. As long as this is true, attackers win.md at master · JohnLaTwC/Shared · GitHub https://github.com/JohnLaTwC/Shared/blob/master/Defenders%20think%20in%20lists.%20Attackers%20think%20in%20graphs.%20As%20long%20as%20this%20is%20true%2C%20attackers%20win.md 163 comments
- There are no secure smartphones. https://www.devever.net/~hl/nosecuresmartphone 146 comments
- Secrecy (Obscurity) is a Valid Security Layer - Daniel Miessler https://danielmiessler.com/study/security-by-obscurity/ 143 comments
- https://www.cs.bu.edu/~jappavoo/Resources/Papers/unikernel-hotos19.pdf 118 comments
- Habitat Chronicles: What Are Capabilities? http://habitatchronicles.com/2017/05/what-are-capabilities/ 70 comments
- https://www.cs.auckland.ac.nz/~pgut001/pubs/book.pdf 54 comments
- https://sel4.systems/About/seL4-whitepaper.pdf 29 comments
- Security Design: Stop Trying to Fix the User - Schneier on Security https://www.schneier.com/blog/archives/2016/10/security_design.html 26 comments
- GitHub - craigmulligan/sandy: A tiny "sandbox" to run untrusted code 🏖️ https://github.com/hobochild/sandy 25 comments
- GitHub - google/gvisor: Application Kernel for Containers https://github.com/google/gvisor 24 comments
- Technical Discussion with SELinux, Seccomp, Sysdig Falco https://sysdig.com/blog/selinux-seccomp-falco-technical-discussion/ 24 comments
- List of UNIX alternatives with desirable capabilities - Pastebin.com http://pastebin.com/BQh3e1ug 21 comments
- http://www.brinch-hansen.net/papers/2001b.pdf 20 comments
- A Guide to Threat Modelling for Developers https://martinfowler.com/articles/agile-threat-modelling.html 18 comments
- How do you explain the unreasonable effectiveness of cloud security? - High Scalability - http://highscalability.com/blog/2018/9/19/how-do-you-explain-the-unreasonable-effectiveness-of-cloud-s.html 18 comments
- Human Adversaries – Why Information Security Is Unlike Engineering « Thoughts on Security https://www.scriptjunkie.us/2016/01/human-adversaries-why-information-security-is-unlike-engineering/ 14 comments
Related searches:
Search whole site: site:github.com
Search title: GitHub - veeral-patel/how-to-secure-anything: How to systematically secure anything: a repository about security engineering
See how to search.