forked from google/building-secure-and-reliable-systems
-
Notifications
You must be signed in to change notification settings - Fork 0
/
oreilly-redirectors-resolved
365 lines (365 loc) · 30.3 KB
/
oreilly-redirectors-resolved
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
https://oreil.ly/0DvJI,https://testing.googleblog.com/2017/11/obsessed-with-primitives.html
https://oreil.ly/0JCPP,https://www.usenix.org/system/files/conference/woot14/woot14-kuhrer.pdf
https://oreil.ly/0jsVi,https://cloud.google.com/binary-authorization/
https://oreil.ly/0SRdz,https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/20134508/winnti-more-than-just-a-game-130410.pdf
https://oreil.ly/0VfIH,https://clang.llvm.org/docs/AddressSanitizer.html#symbolizing-the-reports
https://oreil.ly/0WkhS,https://cloud.google.com/security/beyondprod/#google%E2%80%99s_internal_security_services
https://oreil.ly/0ZD04,https://nvd.nist.gov/vuln/detail/CVE-2014-7169
https://oreil.ly/10wuR,https://github.com/google/clusterfuzz
https://oreil.ly/11AyT,https://googleblog.blogspot.com/2011/06/ensuring-your-information-is-safe.html
https://oreil.ly/11Q2P,https://sirdarckcat.blogspot.com/2016/12/vulnerability-pricing.html
https://oreil.ly/16rCq,https://www.blackhat.com/docs/us-16/materials/us-16-Kralevich-The-Art-Of-Defense-How-Vulnerabilities-Help-Shape-Security-Features-And-Mitigations-In-Android.pdf
https://oreil.ly/17Jm6,https://istio.io/docs/concepts/security/#authentication
https://oreil.ly/_1_iU,https://en.wikipedia.org/wiki/Diminishing_returns
https://oreil.ly/1zV0T,https://github.com/google/knusperli
https://oreil.ly/2-6pU,https://arxiv.org/abs/1702.01715v2
https://oreil.ly/2PWij,https://en.wikipedia.org/wiki/Trusted_Platform_Module
https://oreil.ly/31cv1,https://research.google/pubs/pub27898/
https://oreil.ly/38Vpd,https://github.com/google/tink/blob/master/docs/KEY-MANAGEMENT.md
https://oreil.ly/3PrQI,https://opensource.googleblog.com/2019/02/open-sourcing-clusterfuzz.html
https://oreil.ly/3w5sM,http://clang.llvm.org/extra/clang-tidy/checks/abseil-string-find-startswith.html
https://oreil.ly/3YrvQ,https://gperftools.github.io/gperftools/cpuprofile.html
https://oreil.ly/3ySRv,https://www.darpa.mil/program/cyber-grand-challenge
https://oreil.ly/3z4CT,https://www.rfc-editor.org/errata_search.php?rfc=5288&eid=4694
https://oreil.ly/-46BV,https://www.owasp.org/index.php/Security_by_Design_Principles
https://oreil.ly/4cLxY,https://en.wikipedia.org/wiki/Incident_Command_System
https://oreil.ly/4CPo_,https://en.wikipedia.org/wiki/Undecidable_problem
https://oreil.ly/4Dkod,https://github.com/google/googletest/blob/master/googletest/samples/sample1_unittest.cc#L124
https://oreil.ly/4l2W4,https://seclists.org/oss-sec/2014/q3/650
https://oreil.ly/_4rAo,https://www.usenix.org/conference/srecon19emea/presentation/czapinski
https://oreil.ly/4ruSh,https://man.openbsd.org/sshd_config#ForceCommand
https://oreil.ly/4vLTI,https://en.wikipedia.org/wiki/POSIX
https://oreil.ly/4xLgB,https://www.researchgate.net/publication/239596642_Static_determination_of_dynamic_properties_of_programs
https://oreil.ly/5PwMU,https://en.wikipedia.org/wiki/Pwn2Own
https://oreil.ly/5r61w,https://en.wikipedia.org/wiki/Gimli_Glider
https://oreil.ly/5sOcj,https://www.bloomberg.com/features/2016-how-to-hack-an-election/
https://oreil.ly/60tlV,https://developer.android.com/google/play/asi
https://oreil.ly/6qBkN,https://sirdarckcat.blogspot.com/2017/12/the-optimal-way-for-rewarding.html
https://oreil.ly/6SUwV,https://cloud.google.com/logging/
https://oreil.ly/6x6Yb,https://github.com/google/closure-templates
https://oreil.ly/7avdj,https://www.infosecurity-magazine.com/infosec/poor-security-let-rogue-employee-1/
https://oreil.ly/7eJtF,https://landing.google.com/sre/sre-book/chapters/handling-overload/
https://oreil.ly/7eNxW,https://apnews.com/9bdfd653327fc9c17e643090f08d1d04
https://oreil.ly/7G0mD,https://www.usenix.org/sites/default/files/conference/protected-files/hotsec15_slides_green.pdf
https://oreil.ly/7-gVj,https://www.guidancesoftware.com/encase-forensic
https://oreil.ly/7ii2u,https://nvd.nist.gov/vuln/detail/CVE-2014-6278
https://oreil.ly/7JXZx,https://ai.google/research/pubs/pub44860
https://oreil.ly/7N8mr,https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-184.pdf
https://oreil.ly/7qk8Q,https://en.wikipedia.org/wiki/Command-line_interface
https://oreil.ly/7UhA7,https://security.googleblog.com/2016/12/project-wycheproof.html
https://oreil.ly/7Zf70,http://man7.org/linux/man-pages/man7/capabilities.7.html
https://oreil.ly/8bTuI,https://www.usenix.org/conferences/byname/884
https://oreil.ly/8BXt4,https://clang.llvm.org/docs/HardwareAssistedAddressSanitizerDesign.html
https://oreil.ly/8E04K,https://landing.google.com/sre/workbook/chapters/configuration-design/
https://oreil.ly/8eDCJ,https://en.wikipedia.org/wiki/Shellshock_(software_bug)
https://oreil.ly/8x9OJ,https://cloud.google.com/beyondcorp/
https://oreil.ly/8YkPI,https://tools.ietf.org/html/rfc2986
https://oreil.ly/_8zJm,https://tools.ietf.org/html/rfc6920
https://oreil.ly/9cZK1,https://hbr.org/2013/12/how-google-sold-its-engineers-on-management
https://oreil.ly/9FhBV,https://sback.it/publications/icse2018seip.pdf
https://oreil.ly/9gNIa,https://en.wikipedia.org/wiki/W%5EX
https://oreil.ly/9IG8s,https://tools.ietf.org/html/rfc5905
https://oreil.ly/9K8vD,http://clang.llvm.org/extra/clang-tidy/checks/modernize-use-nullptr.html
https://oreil.ly/9qDWj,https://research.google/pubs/pub36356/
https://oreil.ly/_AAvo,https://opensource.google.com/projects/pytype
https://oreil.ly/abNZP,https://policies.google.com/technologies/retention
https://oreil.ly/aeU6_,https://www.chromium.org/Home/chromium-security/core-principles
https://oreil.ly/ahPxg,https://opensource.google/docs/growing/peer-bonus/
https://oreil.ly/aiKg0,https://en.wikipedia.org/wiki/Multi-factor_authentication
https://oreil.ly/ajmrr,https://docs.bazel.build/versions/master/skylark/build-style.html#visibility
https://oreil.ly/alqtv,https://web.archive.org/web/20190424064430/http:/joxeankoret.com/download/breaking_av_software_44con.pdf
https://oreil.ly/alX7Q,https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/README.md
https://oreil.ly/anLXq,https://cloud.google.com/compute/docs/nodes/
https://oreil.ly/AOYev,https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.md
https://oreil.ly/AReAc,https://google.github.io/oss-fuzz/getting-started/new-project-guide/
https://oreil.ly/aSCRX,https://www.bbc.com/news/uk-46840461
https://oreil.ly/AtXnp,https://kubernetes.io/docs/concepts/overview/working-with-objects/kubernetes-objects/
https://oreil.ly/axc_Y,http://jonlieffmd.com/blog/music-training-and-neuroplasticity
https://oreil.ly/AyMVP,https://cloud.google.com/apis/design/resources
https://oreil.ly/b418b,https://github.com/google/honggfuzz
https://oreil.ly/b6-wy,https://clang.llvm.org/docs/ThreadSanitizer.html
https://oreil.ly/baCc4,https://nats-io.github.io/docs/nats_protocol/nats-protocol-demo.html
https://oreil.ly/BcR9C,https://news.bloomberglaw.com/health-law-and-business/american-medical-collection-agency-parent-files-for-bankruptcy
https://oreil.ly/Bie7A,https://tools.ietf.org/html/rfc4301
https://oreil.ly/bL9Fm,https://fc16.ifca.ai/preproceedings/25_Lang.pdf
https://oreil.ly/bLTJN,https://landing.google.com/sre/sre-book/chapters/addressing-cascading-failures/#xref_cascading-failure_load-shed-graceful-degredation
https://oreil.ly/Bm04C,https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/
https://oreil.ly/boGtL,https://www.youtube.com/watch?v=DNM_yev6qFI
https://oreil.ly/bQthO,https://blog.chromium.org/2015/02/pwnium-v-never-ending-pwnium.html
https://oreil.ly/Btovx,https://edition.cnn.com/2012/11/19/tech/web/cyber-attack-israel-anonymous/index.html
https://oreil.ly/buildSecureReliableSystems,http://shop.oreilly.com/product/0636920297550.do
https://oreil.ly/BUPuH,https://gcc.gnu.org/onlinedocs/gcc-4.8.2/gcc/Warning-Options.html
https://oreil.ly/bUZq8,https://www.owasp.org/images/7/72/OWASP_Top_10-2017_(en).pdf.pdf
https://oreil.ly/BWn0-,https://students.googleblog.com/2013/09/a-day-in-life-of-googles-it-residents.html
https://oreil.ly/C8BXL,https://www.google.com/recaptcha
https://oreil.ly/c_a0N,https://arxiv.org/abs/1706.04337
https://oreil.ly/CicjH,https://www.newyorker.com/magazine/2018/12/10/the-friendship-that-made-google-huge
https://oreil.ly/cJTQ8,https://nvd.nist.gov/vuln/detail/CVE-2014-0160
https://oreil.ly/cMY8z,https://blog.chromium.org/2010/01/encouraging-more-chromium-security.html
https://oreil.ly/cn_il,https://queue.acm.org/detail.cfm?id=2371516
https://oreil.ly/cO_P8,https://testing.googleblog.com/2007/01/introducing-testing-on-toilet.html
https://oreil.ly/CpxXL,https://www.theverge.com/2018/10/16/17987280/youtube-down-outage
https://oreil.ly/C-_Qm,https://chromereleases.googleblog.com
https://oreil.ly/cwl3J,https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5391
https://oreil.ly/cYTHM,https://www.sans.org/top25-software-errors/
https://oreil.ly/d3C-z,https://googleblog.blogspot.com/2010/01/new-approach-to-china.html
https://oreil.ly/dB0au,https://tools.ietf.org/html/rfc8446
https://oreil.ly/DGYDx,https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/
https://oreil.ly/DjOpK,https://istio.io/docs/reference/config/security/authorization-policy/
https://oreil.ly/DjWJn,https://arxiv.org/abs/1812.07527v3
https://oreil.ly/dkocj,http://www.pdsw.org/pdsw-discs17/slides/PDSW-DISCS-Google-Keynote.pdf
https://oreil.ly/drZss,https://ai.google/research/pubs/pub42934
https://oreil.ly/DuLZV,https://www.cnet.com/news/china-linked-to-new-breaches-tied-to-rsa/
https://oreil.ly/dYXkG,https://threatpost.com/hacker-puts-hosting-service-code-spaces-out-of-business/106761/
https://oreil.ly/EaL2N,https://en.wikipedia.org/wiki/SYN_cookies
https://oreil.ly/EBJb9,https://security.googleblog.com/2018/07/mitigating-spectre-with-site-isolation.html
https://oreil.ly/ecCr9,https://github.com/google/wycheproof
https://oreil.ly/eChGB,https://www.owasp.org/images/7/72/OWASP_Top_10-2017_(en).pdf.pdf
https://oreil.ly/editorial-independence,http://www.oreilly.com/about/editorial_independence.html
https://oreil.ly/EiiiU,http://legacydirs.umiacs.umd.edu/~tdumitra/papers/WEIS-2018.pdf
https://oreil.ly/EJNnj,https://landing.google.com/sre/sre-book/chapters/service-level-objectives/
https://oreil.ly/Em5wF,https://www.latimes.com/archives/la-xpm-2008-mar-15-me-britney15-story.html
https://oreil.ly/EPwod,https://clang.llvm.org/docs/SafeStack.html
https://oreil.ly/Es3PA,https://www.nytimes.com/2011/05/28/business/28hack.html
https://oreil.ly/EsBfd,https://cloud.google.com/security/encryption-in-transit/application-layer-transport-security/
https://oreil.ly/EVa7K,https://landing.google.com/sre/sre-book/chapters/introduction/
https://oreil.ly/ew-BA,https://www.nasa.gov/columbia/home/CAIB_Vol1.html
https://oreil.ly/eYfUO,https://www.slideshare.net/bcantrill/zebras-all-the-way-down-the-engineering-challenges-of-the-data-path
https://oreil.ly/f1J7X,https://github.com/google/fuzzer-test-suite
https://oreil.ly/f4gdr,https://en.wikipedia.org/wiki/Code_signing
https://oreil.ly/F8pga,https://www.sec.gov/news/pressrelease/2016-280.html
https://oreil.ly/fF_EA,https://en.wikipedia.org/wiki/Ambient_authority
https://oreil.ly/fGTHa,https://www.nrc.gov/about-nrc/regulatory/risk-informed/pra.html
https://oreil.ly/Fhckk,https://developers.google.com/admin-sdk/reports/v1/guides/manage-audit-drive
https://oreil.ly/F_iBb,https://landing.google.com/sre/sre-book/chapters/monitoring-distributed-systems/
https://oreil.ly/Fl82Z,https://www.gnu.org/software/gdb/
https://oreil.ly/Fm6IJ,https://www.sans.org/top25-software-errors
https://oreil.ly/fN9f3,https://software.intel.com/security-software-guidance/api-app/software-guidance/l1-terminal-fault
https://oreil.ly/fRXLV,https://clang.llvm.org/docs/UndefinedBehaviorSanitizer.html
https://oreil.ly/ful41,https://www.mitre.org/publications/technical-papers/the-mitre-systems-engineering-guide
https://oreil.ly/fvSKQ,https://en.wikipedia.org/wiki/Chaos_engineering
https://oreil.ly/Fvx4L,https://en.wikipedia.org/wiki/Chaos_engineering
https://oreil.ly/fx86y,https://github.com/google/sandboxed-api
https://oreil.ly/fZAD-,https://www.washingtonpost.com/news/the-switch/wp/2015/06/08/the-u-s-armys-main-web-site-is-down-and-the-syrian-electronic-army-is-claiming-credit
https://oreil.ly/G1A9q,https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-felt.pdf
https://oreil.ly/GBGam,https://www.iso.org/standard/72311.html
https://oreil.ly/gd3MY,https://landing.google.com/sre/sre-book/chapters/embracing-risk/
https://oreil.ly/GD6cY,https://ieeexplore.ieee.org/document/8559686
https://oreil.ly/gfdBF,https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.6.7.pdf
https://oreil.ly/gJ64J,http://lcamtuf.coredump.cx/afl/
https://oreil.ly/GJJq9,https://github.com/google/sanitizers/wiki/ThreadSanitizerCppManual
https://oreil.ly/gKJDy,https://cacm.acm.org/magazines/2018/4/226371-lessons-from-building-static-analysis-tools-at-google/fulltext
https://oreil.ly/gN12-,https://git-scm.com/docs/git-shell
https://oreil.ly/gpxoL,https://rework.withgoogle.com/blog/five-keys-to-a-successful-google-team/
https://oreil.ly/GxjAV,https://seclists.org/fulldisclosure/2008/Sep/35
https://oreil.ly/GZmUW,https://medium.com/netflix-techblog/the-netflix-simian-army-16e57fbab116
https://oreil.ly/h4ok1,https://github.com/google/knusperli/blob/master/jpeg_data_reader.h#L31
https://oreil.ly/H9q9p,https://www.debian.org/doc/debian-policy/ch-maintainerscripts.html
https://oreil.ly/heY_0,https://en.wikipedia.org/wiki/Year_2038_problem
https://oreil.ly/hfydr,https://www.xilinx.com/support/documentation/user_guides/ug1085-zynq-ultrascale-trm.pdf
https://oreil.ly/hiKqf,https://www.justice.gov/opa/press-release/file/1156521/download
https://oreil.ly/hlezU,https://developers.google.com/protocol-buffers/
https://oreil.ly/HnrdZ,https://github.com/google/fuzzing/blob/master/docs/split-inputs.md#fuzzed-data-provider
https://oreil.ly/hoBK3,https://queue.acm.org/detail.cfm?id=2371516
https://oreil.ly/HpYx2,https://www.spinnakersummit.com/blog/the-101-on-chaos-monkey-and-spinnaker
https://oreil.ly/hu7yg,https://spring.io/projects/spring-cloud-config
https://oreil.ly/hxpj3,https://cloud.google.com/blog/topics/inside-google-cloud/an-update-on-sundays-service-disruption
https://oreil.ly/hyDi_,https://landing.google.com/sre/sre-book/chapters/accelerating-sre-on-call#xref_training_disaster-rpg
https://oreil.ly/i1GOs,https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report/
https://oreil.ly/i9DTQ,https://cloud.google.com/blog/products/containers-kubernetes/exploring-container-security-how-containers-enable-passive-patching-and-a-better-model-for-supply-chain-security
https://oreil.ly/idleN,https://www.youtube.com/watch?v=u5senBJUkPc
https://oreil.ly/IeMvF,https://landing.google.com/sre/sre-book/chapters/accelerating-sre-on-call/
https://oreil.ly/IfFJ1,https://sback.it/publications/icse2018seip.pdf
https://oreil.ly/IqDN_,https://citizenlab.ca/2018/07/nso-spyware-targeting-amnesty-international/
https://oreil.ly/iQn3z,https://sirdarckcat.blogspot.com/2017/02/vulnerability-disclosure-in-era-of.html
https://oreil.ly/IRkjI,https://cloud.google.com/security/encryption-in-transit/application-layer-transport-security/
https://oreil.ly/irovS,https://en.wikipedia.org/wiki/WannaCry_ransomware_attack
https://oreil.ly/It4-h,https://queue.acm.org/detail.cfm?id=3096459
https://oreil.ly/iyxQ1,https://github.com/google/sanitizers/wiki/AddressSanitizerComparisonOfMemoryTools
https://oreil.ly/j_0Co,https://www.symantec.com/connect/blogs/suckfly-revealing-secret-life-your-code-signing-certificates
https://oreil.ly/J1Vao,https://chromium.googlesource.com/chromium/src/+/master/docs/process/release_cycle.md
https://oreil.ly/J2U1R,https://jvns.ca/blog/2019/06/23/a-few-debugging-resources/
https://oreil.ly/JaC0B,http://pdf.textfiles.com/academics/wilyhacker.pdf
https://oreil.ly/jGrvI,https://cloud.google.com/beyondcorp/#researchPapers
https://oreil.ly/Jua6_,https://googleblog.blogspot.com/2009/01/this-site-may-harm-your-computer-on.html
https://oreil.ly/jWQsI,https://github.com/openssl/openssl/blob/OpenSSL_1_1_0-stable/fuzz/bignum.c
https://oreil.ly/jXTZM,https://ai.google/research/pubs/pub45424
https://oreil.ly/jZgl5,https://en.wikipedia.org/wiki/XUnit
https://oreil.ly/K39Q2,https://github.com/google/oss-fuzz/blob/master/docs/advanced-topics/corpora.md
https://oreil.ly/k4igi,https://git-scm.com/docs/git-shell
https://oreil.ly/K4Oan,https://en.wikipedia.org/wiki/You_aren't_gonna_need_it
https://oreil.ly/k5A3c,https://cloud.google.com/kms/docs/quickstart
https://oreil.ly/kRc5Z,https://www.iso.org/standard/72311.html
https://oreil.ly/ks1HD,https://landing.google.com/sre/sre-book/chapters/production-environment/
https://oreil.ly/KZ03g,https://landing.google.com/sre/sre-book/chapters/service-level-objectives/
https://oreil.ly/kZQNh,https://cloud.google.com/security/encryption-in-transit/
https://oreil.ly/L0u6I,https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
https://oreil.ly/L144H,https://landing.google.com/sre/workbook/chapters/overload/
https://oreil.ly/Lc2eY,https://martinfowler.com/articles/is-quality-worth-cost.html
https://oreil.ly/Lgtv3,https://sirdarckcat.blogspot.com/2015/09/not-about-money.html
https://oreil.ly/LmLCV,https://en.cppreference.com/w/cpp/language/ub
https://oreil.ly/lmrox,https://clang.llvm.org/extra/clang-tidy/checks/abseil-string-find-startswith.html
https://oreil.ly/LwmI6,https://en.wikipedia.org/wiki/Incident_Command_System
https://oreil.ly/m0HRU,https://en.wikipedia.org/wiki/Anycast
https://oreil.ly/m5mge,https://tools.ietf.org/html/rfc7914
https://oreil.ly/M69rg,https://www.destroyallsoftware.com/talks/wat
https://oreil.ly/m815w,https://golang.org/cmd/vet/
https://oreil.ly/m8dug,https://google.github.io/styleguide/cppguide.html
https://oreil.ly/m9rU1,https://landing.google.com/sre/sre-book/chapters/service-level-objectives/
https://oreil.ly/mBSSw,http://www.valgrind.org/docs/manual/hg-manual.html
https://oreil.ly/_mfzd,https://www.chromium.org/Home/chromium-security/site-isolation
https://oreil.ly/mIjbw,https://opensource.googleblog.com/2016/12/announcing-oss-fuzz-continuous-fuzzing.html
https://oreil.ly/mJBh1,http://lcamtuf.coredump.cx/afl/demo/
https://oreil.ly/MMhA7,https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5390
https://oreil.ly/mnPdJ,https://google.github.io/eng-practices/review/
https://oreil.ly/mQFJj,https://nvd.nist.gov/vuln/detail/CVE-2014-6271
https://oreil.ly/mRhGN,https://nvd.nist.gov/vuln/detail/CVE-2014-6271
https://oreil.ly/mrTi7,https://cloud.google.com/security-scanner/
https://oreil.ly/MSlrf,https://cloud.google.com/blog/products/gcp/adventures-in-sre-land-welcome-to-google-mission-control
https://oreil.ly/MtL_o,https://landing.google.com/sre/sre-book/chapters/service-level-objectives/
https://oreil.ly/mVluG,https://www.justice.gov/opa/press-release/file/1092091/download
https://oreil.ly/my8fa,https://android-developers.googleblog.com/2019/02/android-security-improvement-update.html?linkId=64187521
https://oreil.ly/N1g_X,https://www.theguardian.com/world/2018/jan/28/fitness-tracking-app-gives-away-location-of-secret-us-army-bases
https://oreil.ly/_n1KP,http://www.peach.tech/resources/peachcommunity/
https://oreil.ly/_N25V,https://blogs.msdn.microsoft.com/zainnab/2011/05/26/code-metrics-maintainability-index/
https://oreil.ly/n6-j9,https://medium.com/@copyconstruct/monitoring-in-the-time-of-cloud-native-c87c7a5bfa3e
https://oreil.ly/NbfFj,https://www.cs.unc.edu/~reiter/papers/2010/CCS.pdf
https://oreil.ly/NkxYL,https://clang.llvm.org/docs/AddressSanitizer.html
https://oreil.ly/nn6u0,https://github.com/gcc-mirror/gcc/tree/master/gcc/testsuite/gcc.c-torture
https://oreil.ly/nuNjO,https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodm/857001m.pdf
https://oreil.ly/NVSXJ,https://landing.google.com/sre/workbook/chapters/incident-response/
https://oreil.ly/nwNnG,https://www.wired.com/2011/09/diginotar-bankruptcy/
https://oreil.ly/NYr7y,https://testing.googleblog.com/2017/08/code-health-eliminate-yagni-smells.html
https://oreil.ly/nzkF9,https://aws.amazon.com/kms/
https://oreil.ly/O0kva,https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
https://oreil.ly/O7ElS,https://manpages.debian.org/jump?q=deb-buildinfo.5
https://oreil.ly/oDjT-,https://googleprojectzero.blogspot.com/2015/02/feedback-and-data-driven-updates-to.html
https://oreil.ly/OIX0b,https://www.debian.org/security/2008/dsa-1571
https://oreil.ly/Oj9ng,https://www.infoworld.com/article/2608076/murder-in-the-amazon-cloud.html
https://oreil.ly/OkYRq,https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.6.7.pdf
https://oreil.ly/ONE8f,https://en.wikipedia.org/wiki/Code_smell
https://oreil.ly/oWzO8,http://www.hacktivismo.com/about/declaration.php
https://oreil.ly/OZvsg,https://landing.google.com/sre/sre-book/chapters/introduction/
https://oreil.ly/P0JdF,https://landing.google.com/sre/sre-book/chapters/evolving-sre-engagement-model/
https://oreil.ly/p3yP1,https://en.wikipedia.org/wiki/List_of_tools_for_static_code_analysis
https://oreil.ly/pA9ba,https://chromium.googlesource.com/chromium/src/+/master/docs/security/sheriff.md
https://oreil.ly/_PAzE,https://open-security-summit.org/tracks/devsecops/
https://oreil.ly/PO1QR,https://testing.googleblog.com/2017/06/code-health-reduce-nesting-reduce.html
https://oreil.ly/PudXU,https://docs.python.org/2/reference/datamodel.html#object.__ne__
https://oreil.ly/PUkYz,https://developer.android.com/training/articles/keystore
https://oreil.ly/pXJBL,https://www.perforce.com/blog/qac/what-cyclomatic-complexity
https://oreil.ly/PzTUF,https://en.wikipedia.org/wiki/Component_Object_Model
https://oreil.ly/q2Bgw,https://pages.nist.gov/800-63-3/
https://oreil.ly/Q3teN,http://clang.llvm.org/extra/clang-tidy/checks/bugprone-sizeof-expression.html
https://oreil.ly/QaE4s,https://github.com/google/nsjail
https://oreil.ly/qbTqD,https://www.gnu.org/software/bash/
https://oreil.ly/qFh_k,https://clang.llvm.org/extra/clang-tidy.html
https://oreil.ly/qILyu,https://www.ee.oulu.fi/research/ouspg/Disclosure_tracking
https://oreil.ly/QJuBm,https://eu.usatoday.com/story/tech/news/2017/02/21/verizon-shaves-350-million-yahoo-price/98188452/
https://oreil.ly/qqdMy,https://github.com/google/sanitizers/wiki
https://oreil.ly/QXg1F,https://www.faa.gov/air_traffic/publications/atpubs/aim_html/chap4_section_2.html
https://oreil.ly/qxVk2,https://sel4.systems/Info/FAQ/proof.pml
https://oreil.ly/qYpj8,https://www.google.com/about/appsecurity/learning/xss/
https://oreil.ly/R4-8A,https://blogs.adobe.com/security/2012/09/inappropriate-use-of-adobe-code-signing-certificate.html
https://oreil.ly/r65fM,https://www.ndss-symposium.org/wp-content/uploads/2019/02/ndss2019_04B-3_Meli_paper.pdf
https://oreil.ly/RaYQx,https://developers.google.com/gmail/api/
https://oreil.ly/Rb6TJ,https://www.wired.com/story/chrome-decade-making-the-web-more-secure/
https://oreil.ly/rDsp_,https://www.envoyproxy.io/docs/envoy/v1.6.0/configuration/http_filters/fault_filter
https://oreil.ly/rdYsN,https://dl.acm.org/doi/pdf/10.1145/3188720?download=true
https://oreil.ly/r-jx6,https://testing.googleblog.com/2017/05/oss-fuzz-five-months-later-and.html
https://oreil.ly/rME44,https://security.googleblog.com/2019/05/queue-hardening-enhancements.html
https://oreil.ly/Row8c,https://en.wikipedia.org/wiki/Software-defined_networking
https://oreil.ly/rRqkZ,http://man.openbsd.org/ssh-keygen.1#KEY_REVOCATION_LISTS
https://oreil.ly/RU46m,https://golang.org/doc/articles/race_detector.html
https://oreil.ly/RWvPF,https://www.sans.org/top25-software-errors
https://oreil.ly/S2ZMU,http://fc16.ifca.ai/preproceedings/25_Lang.pdf
https://oreil.ly/SfYxy,https://principlesofchaos.org/?lang=ENcontent
https://oreil.ly/SRE-book-toc,https://landing.google.com/sre/sre-book/toc/index.html
https://oreil.ly/SRE-workbook-TOC,https://landing.google.com/sre/workbook/toc/
https://oreil.ly/ssfOj,https://www.chromium.org/Home/chromium-security/guts
https://oreil.ly/SUdXz,https://en.wikiquote.org/wiki/Heraclitus
https://oreil.ly/t0fnj,https://landing.google.com/sre/sre-book/chapters/embracing-risk/#xref_risk-management_unreliability-budgets
https://oreil.ly/t4EoT,https://chromium.googlesource.com/chromium/src/+/master/docs/code_reviews.md
https://oreil.ly/T9G4D,https://csrc.nist.gov/publications/detail/sp/800-122/final
https://oreil.ly/tDKBJ,https://queue.acm.org/detail.cfm?id=2898444
https://oreil.ly/teoUI,https://www.chromium.org/Home/chromium-security/quarterly-updates
https://oreil.ly/TFb4b,https://cloud.google.com/kms/docs/key-rotation#reasons_for_rotating_a_key
https://oreil.ly/t_FP9,https://security.googleblog.com/2010/07/rebooting-responsible-disclosure-focus.html
https://oreil.ly/tg1HX,http://www.cplusplus.com/reference/string/string/find/
https://oreil.ly/_TiJc,https://security.googleblog.com/2018/11/a-new-chapter-for-oss-fuzz.html
https://oreil.ly/TnBaK,https://www.owasp.org/images/7/72/OWASP_Top_10-2017_(en).pdf.pdf
https://oreil.ly/TnmPu,https://en.wikipedia.org/wiki/DirectX
https://oreil.ly/_TsjS,https://en.wikipedia.org/wiki/Garbage_collection_(computer_science)
https://oreil.ly/tWlyz,https://github.com/google/oss-fuzz/
https://oreil.ly/u4cJV,https://content.fireeye.com/apt/rpt-apt38
https://oreil.ly/u9Jfh,https://clang.llvm.org/docs/MemorySanitizer.html
https://oreil.ly/ubToZ,https://www.cpacanada.ca/en/business-and-accounting-resources/audit-and-assurance/overview-of-webtrust-services/principles-and-criteria
https://oreil.ly/UHbVu,https://cloud.google.com/security-key/
https://oreil.ly/UIlV6,https://www.rfc-editor.org/info/rfc2235
https://oreil.ly/UKo2t,https://kubernetes.io/docs/concepts/overview/working-with-objects/kubernetes-objects/
https://oreil.ly/upg-w,https://www.agilealliance.org/agile101/
https://oreil.ly/Urmzl,https://www.fluentcpp.com/2016/12/08/strong-types-for-strong-interfaces/
https://oreil.ly/uRzhZ,https://llvm.org/docs/LibFuzzer.html
https://oreil.ly/uSpFn,https://training.fema.gov/emiweb/is/icsresource/trainingmaterials.htm
https://oreil.ly/v6DeI,https://www.scmagazineuk.com/black-hat-usa-2018-google-microsoft-red-hat-dish-meltdown-spectre-backstory/article/1490115
https://oreil.ly/vAunm,https://securityintelligence.com/ponemon-cost-of-a-data-breach-2018/
https://oreil.ly/V-FEC,https://www.usenix.org/conference/srecon18europe/presentation/bennett
https://oreil.ly/vJ66c,https://queue.acm.org/detail.cfm?id=2371516
https://oreil.ly/vQNR3,https://transparencyreport.google.com/?hl=en
https://oreil.ly/VrN4w,https://github.com/w3c/webappsec-trusted-types
https://oreil.ly/vxJAP,https://developers.google.com/identity/protocols/OpenIDConnect
https://oreil.ly/vyXAE,https://www.wired.com/2016/08/computer-outage-can-take-whole-airline/
https://oreil.ly/w17Yn,https://www.concordlawschool.edu/blog/news/liability-corporate-boards-data-breaches/
https://oreil.ly/W3OFr,https://www.dativa.com/data-science-gdpr-pseudonymization-data-pipeline/
https://oreil.ly/W5t4I,https://developers.google.com/web/fundamentals/primers/service-workers/
https://oreil.ly/-w6DM,https://stackify.com/code-coverage-tools/
https://oreil.ly/Wap7b,https://www.blackhat.com/us-19/briefings/schedule/index.html#every-security-team-is-a-software-team-now-17280
https://oreil.ly/_Wmcx,https://www.sans.org/reading-room/whitepapers/analyst/membership/36792
https://oreil.ly/WM_zw,https://golang.org/pkg/crypto/x509/#ParseCertificateRequest
https://oreil.ly/wNI2u,https://en.wikipedia.org/wiki/EternalBlue
https://oreil.ly/WNu9A,https://en.wikipedia.org/wiki/Stuxnet
https://oreil.ly/WNUw_,https://manpages.debian.org/jump?q=deb-buildinfo.5
https://oreil.ly/WP_FI,https://en.wikipedia.org/wiki/CAP_theorem
https://oreil.ly/x3hfo,https://enterprise.verizon.com/resources/reports/dbir/
https://oreil.ly/XDPI2,https://www.openssl.org/news/secadv/20091111.txt
https://oreil.ly/XF4ta,https://cloud.google.com/logging/docs/audit/
https://oreil.ly/xFPfT,https://queue.acm.org/detail.cfm?id=2371516
https://oreil.ly/xpo5t,https://llvm.org/docs/ScudoHardenedAllocator.html
https://oreil.ly/xuQrD,https://en.wikipedia.org/wiki/A/B_testing
https://oreil.ly/xvpFp,https://ieeexplore.ieee.org/document/8418618
https://oreil.ly/-XYhE,https://cwe.mitre.org/top25/archive/2019/2019_cwe_top25.html
https://oreil.ly/y0xRl,https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1870
https://oreil.ly/y2Eqd,https://github.com/isocpp/CppCoreGuidelines
https://oreil.ly/Y5VFW,https://reproducible-builds.org/docs/
https://oreil.ly/yFvEU,https://landing.google.com/sre/workbook/chapters/implementing-slos/#modeling-user-journeys
https://oreil.ly/YGbtX,https://osdfir.blogspot.com
https://oreil.ly/YGCjO,https://research.google.com/archive/spanner-osdi2012.pdf
https://oreil.ly/yGhh-,https://www.jetbrains.com/help/clion/google-sanitizers.html
https://oreil.ly/yIaKz,https://opensource.googleblog.com/2016/12/announcing-oss-fuzz-continuous-fuzzing.html
https://oreil.ly/yJdVl,https://cloud.google.com/event-threat-detection/
https://oreil.ly/YJmwk,https://www.nytimes.com/2016/02/28/magazine/what-google-learned-from-its-quest-to-build-the-perfect-team.html
https://oreil.ly/y-OYm,https://www.usenix.org/legacy/event/woot10/tech/full_papers/Rizzo.pdf
https://oreil.ly/yRUQ3,https://developers.google.com/protocol-buffers/docs/proto#updating
https://oreil.ly/_yS2Q,https://www.cryptolux.org/images/0/0d/Argon2.pdf
https://oreil.ly/ywq1N,https://files.fuzzing-project.org/
https://oreil.ly/YxiJX,https://cloud.google.com/binary-authorization/
https://oreil.ly/yyf6K,https://nvd.nist.gov/vuln/detail/CVE-2014-6277
https://oreil.ly/yzES2,https://developers.google.com/protocol-buffers/
https://oreil.ly/z1BQk,https://clang.llvm.org/docs/ThreadSafetyAnalysis.html
https://oreil.ly/Z1UL8,https://en.wikipedia.org/wiki/Slashdot_effect
https://oreil.ly/-Z4F4,https://developers.google.com/fonts/docs/developer_api
https://oreil.ly/Z9O5m,https://clang.llvm.org/docs/LeakSanitizer.html
https://oreil.ly/zgKsd,https://ai.google/research/pubs/pub43438
https://oreil.ly/ZhNsa,https://attack.mitre.org/techniques/T1075/
https://oreil.ly/ZMbIO,http://edition.cnn.com/TECH/space/9909/30/mars.metric.02/
https://oreil.ly/ZN18B,https://research.google/pubs/pub47861/
https://oreil.ly/ZnhV-,https://research.google.com/archive/spanner-osdi2012.pdf
https://oreil.ly/zNZ7G,https://wiki.debian.org/ReproducibleBuilds
https://oreil.ly/ZQGNW,https://www.google.com/about/appsecurity/reward-program/
https://oreil.ly/ZrWkS,https://www.youtube.com/watch?v=0zqBlRW_6jA&t=1s
https://oreil.ly/ZRZAI,https://www.usenix.org/conference/lisa15/conference-program/presentation/krishnan
https://oreil.ly/zTtl-,https://github.com/google/knusperli/blob/master/jpeg_data_reader.h#L42
https://oreil.ly/zV9E0,https://en.wikipedia.org/wiki/Year_2000_problem
https://oreil.ly/ZxFQj,https://cdn1.esetstatic.com/ESET/US/resources/datasheets/ESETus-datasheet-lojax.pdf
https://oreil.ly/zxfz2,https://en.wikipedia.org/wiki/Code_smell
https://oreil.ly/ZYr1W,https://www.usenix.org/system/files/conference/osdi12/osdi12-final-16.pdf