Security can no longer be a bolt-on at the end of projects. This track explores how to incorporate security best practices into your system architecture from the ground up into every layer of your applications.
Erik St. Martin (Microsoft) curiosity of computers began in his early childhood years playing on a family member's Macintosh SE. He was too young to understand the world of programming then, but it was enough to peak his interest. In his teen years the internet became very popular and he was infatuated with the concept of building my own websites, and like all teenage computer geeks the thrill of "learning to hack". He cut his teeth building his own websites and learned to program by modifying open-source forum software in Perl and PHP, and running his own Counter-Strike servers. Before he knew it I was being offered money to program as a profession. He has been in the open-source and Linux world ever since.
©2018, O'Reilly Media, Inc. • (800) 889-8969 or (707) 827-7019 • Monday-Friday 7:30am-5pm PT • All trademarks and registered trademarks appearing on oreilly.com are the property of their respective owners. • firstname.lastname@example.org