Enjoy fast, free delivery, exclusive deals, and award-winning movies & TV shows with Prime
Try Prime
and start saving today with fast, free delivery
Amazon Prime includes:
Fast, FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with Fast, FREE Delivery" below the Add to Cart button.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited Free Two-Day Delivery
- Streaming of thousands of movies and TV shows with limited ads on Prime Video.
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
- Unlimited photo storage with anywhere access
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.
Buy new:
$27.99$27.99
FREE delivery: Saturday, April 6 on orders over $35.00 shipped by Amazon.
Ships from: Amazon.com Sold by: Amazon.com
Buy used: $22.81
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Image Unavailable
Color:
-
-
-
- To view this video download Flash Player
-
-
-
-
-
-
-
2 VIDEOS -
Alice and Bob Learn Application Security 1st Edition
Purchase options and add-ons
Learn application security from the very start, with this comprehensive and approachable guide!
Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software development. This book covers all the basic subjects such as threat modeling and security testing, but also dives deep into more complex and advanced topics for securing modern software systems and architectures. Throughout, the book offers analogies, stories of the characters Alice and Bob, real-life examples, technical explanations and diagrams to ensure maximum clarity of the many abstract and complicated subjects.
Topics include:
- Secure requirements, design, coding, and deployment
- Security Testing (all forms)
- Common Pitfalls
- Application Security Programs
- Securing Modern Applications
- Software Developer Security Hygiene
Alice and Bob Learn Application Security is perfect for aspiring application security engineers and practicing software developers, as well as software project managers, penetration testers, and chief information security officers who seek to build or improve their application security programs.
Alice and Bob Learn Application Security illustrates all the included concepts with easy-to-understand examples and concrete practical applications, furthering the reader's ability to grasp and retain the foundational and advanced topics contained within.
- ISBN-101119687357
- ISBN-13978-1119687351
- Edition1st
- PublisherWiley
- Publication dateNovember 10, 2020
- LanguageEnglish
- Dimensions7.3 x 0.8 x 9.2 inches
- Print length288 pages
Frequently bought together

Similar items that may ship from close to you
From the Publisher
|
|
|
|
|---|---|---|
|
|
|
|
|
|
|
|
|---|---|---|
|
|
|
|
Editorial Reviews
Review
“Tanya knows her stuff. She has a huge depth of experience and expertise in application security, DevSecOps, and cloud security. We can all learn a ton of stuff from Tanya, so you should read her book!”
-Dafydd Stuttard, best-selling co-author of The Web Application Hacker's Handbook, creator of Burp Suite
“I learned so much from this book! Information security is truly everyone's job ― this book is a fantastic overview of the vast knowledge needed by everyone, from developer, infrastructure, security professionals, and so much more. Kudos to Ms. Janca for writing such an educational and practical primer. I loved the realistic stories that frame real-world problems, spanning everything from design, migrating applications from problematic frameworks, mitigating admin risks, and things that every modern developer needs to know.”
-Gene Kim, bestselling author of The Unicorn Project, co-author of The Phoenix Project, DevOps Handbook, Accelerate
“Practical guidance for the modern era; Tanya does a great job of communicating current day thinking around AppSec in terms we can all relate to.”
-Troy Hunt, creator of "Have I Been Pwned"
From the Inside Flap
A TRIED-AND-TESTED APPROACH TO BUILDING SECURITY INTO PROJECTS FROM THE START
Do you have difficulty implementing application security into your software development process? Alice and Bob Learn Application Security shows readers how to "push left" in software, by building security considerations into their system development life cycle, right from the start.
You'll learn basic security fundamentals and requirements, as well as secure design concepts, all while benefiting from the code, exercises, and examples interspersed throughout the text.
Written by one of the leading voices in the application security field, the book includes answers to the most common questions people starting out in application security often have. It also includes valuable additional resources where readers can find more answers.
The core security concepts are illustrated through references to the personas of Alice and Bob and how their professional lives and businesses drive application security decisions. The book takes a pleasantly straightforward approach that's heavy on practical strategies and light on needless jargon or complexity. At the same time, it supplies the rigor or richness you would expect to find in a leading resource on the topic of application security.
The book is perfect for current and aspiring software and application developers. It also belongs on the bookshelves of software project managers, Chief Information Security Officers, and penetration testers who seek to improve their craft and their ability to deliver valuable results.
Alice and Bob Learn Application Security will teach you everything you need to know about:
- Security fundamentals and requirements
- Secure design concepts
- Secure coding (with guidelines)
- The basics of threat modelling and security testing
- How to build an AppSec program
- Modern application security concerns and defenses
- How to implement security hygiene protocols for developers and IT staff
From the Back Cover
A TRIED-AND-TESTED APPROACH TO BUILDING SECURITY INTO PROJECTS FROM THE START
Do you have difficulty implementing application security into your software development process? Alice and Bob Learn Application Security shows readers how to "push left" in software, by building security considerations into their system development life cycle, right from the start.
You'll learn basic security fundamentals and requirements, as well as secure design concepts, all while benefiting from the code, exercises, and examples interspersed throughout the text.
Written by one of the leading voices in the application security field, the book includes answers to the most common questions people starting out in application security often have. It also includes valuable additional resources where readers can find more answers.
The core security concepts are illustrated through references to the personas of Alice and Bob and how their professional lives and businesses drive application security decisions. The book takes a pleasantly straightforward approach that's heavy on practical strategies and light on needless jargon or complexity. At the same time, it supplies the rigor or richness you would expect to find in a leading resource on the topic of application security.
The book is perfect for current and aspiring software and application developers. It also belongs on the bookshelves of software project managers, Chief Information Security Officers, and penetration testers who seek to improve their craft and their ability to deliver valuable results.
Alice and Bob Learn Application Security will teach you everything you need to know about:
- Security fundamentals and requirements
- Secure design concepts
- Secure coding (with guidelines)
- The basics of threat modelling and security testing
- How to build an AppSec program
- Modern application security concerns and defenses
- How to implement security hygiene protocols for developers and IT staff
About the Author
Tanya Janca, also known as SheHacksPurple, is the founder of We Hack Purple, an online learning academy dedicated to teaching everyone how to create secure software. With over twenty years of IT and coding experience, she has won numerous awards and worked as a developer, pentester, and AppSec Engineer. She was named Hacker of the Year by the Cybersecurity Woman of the Year 2019 Awards and is the Founder of WoSEC International, #CyberMentoringMonday, and OWASP DevSlop.
Product details
- Publisher : Wiley; 1st edition (November 10, 2020)
- Language : English
- Paperback : 288 pages
- ISBN-10 : 1119687357
- ISBN-13 : 978-1119687351
- Item Weight : 2.31 pounds
- Dimensions : 7.3 x 0.8 x 9.2 inches
- Best Sellers Rank: #486,025 in Books (See Top 100 in Books)
- #143 in Computer Cryptography
- #158 in Web Encryption
- #13,002 in Unknown
- Customer Reviews:
Videos
Videos for this product

2:42
Click to play video

Alice and Bob Learn Application Security
Merchant Video
Videos for this product

0:38
Click to play video

Cyber Security Awareness
Merchant Video
About the author

Tanya Janca, also known as SheHacksPurple, is the author of ‘Alice and Bob Learn Application Security’. She is also the founder of We Hack Purple, an online learning academy, community and podcast that revolves around teaching everyone to create secure software. Tanya has been coding and working in IT for over twenty years, won numerous awards, and has been everywhere from startups to public service to tech giants (Microsoft, Adobe, & Nokia). She has worn many hats; startup founder, pentester, CISO, AppSec Engineer, and software developer. She is an award-winning public speaker, active blogger & streamer and has delivered hundreds of talks and trainings on 6 continents. She values diversity, inclusion and kindness, which shines through in her countless initiatives.
Founder: We Hack Purple (Academy, Community and Podcast), WoSEC International (Women of Security), OWASP DevSlop, OWASP Victoria, #CyberMentoringMonday
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
The book is well-written, to the point, and walks developers through the entire thought process behind building secure software, both culturally and technically.
If you’re looking for a book that is easy to read and will give you a good mix of practical security information (such as what HTTP security headers you should be using in your web applications) to principles and best practices (such as understanding the C-I-A model and threat modeling), you won’t go wrong with this book.
I highly recommend it to anyone new to the world of application security. It’s an accessible and fun introduction to the space — you’ll learn a lot! =)
Alice and Bob are that dynamic duo of infosec that are often foils for good and bad practices, are used as teaching examples that reek of events drawn from Janca’s previous employers and consulting gigs.
Next, who is Tanya Janca? Tanya is the foremost expert in application security. With years of experience in software development and cyber security as well as countless conference talks, webcasts, YouTube videos, and blog posts, it’s no wonder she literally wrote the book on application security. Tanya is an excellent communicator. She is an expert in application security, and she knows how to reach her audience regardless of their levels of expertise.
I have to say that this book was long overdue. There has never, to my knowledge, been anything else like this. I learned most of what I know of application security through various scattered resources from certification guides to YouTube videos to web-based articles. Sure, there’s a lot of info, but until now there was nothing that tied it all together. Alice & Bob is the first of its kind. I’m sure there’ll be plenty of copycats. On to the review!
Alice & Bob is not just a collection of information, nor is it a do it this way, not that way sort of guide. Tanya does explain the correct way to accomplish a task, but she also gives you the reasons behind her statements, and those reasons are backed up with solid references and real-life examples. Alice & Bob is presented similarly to a college course, where each successive chapter builds on the previous chapters. And like a college course, each chapter contains a quiz.
Most reference guides are not meant to be read front-to-back. It's usually easier just to search for the information you need. In this case, you should read it start-to-finish and then keep it on hand to access information as necessary. The book is divided into three main parts and 11 logically ordered chapters. By logically ordered, I mean that it takes you from beginner-level security concepts through incident handling and threat modeling (nice breakdown of threat types, by the way), secure coding, and defense in depth/layered security (and how web application security applies) and then shows you how to create a learning plan to help you grow as an analyst. Many of us have more or less followed the make it up as we go philosophy with no real plan, so having a structured learning plan is extremely helpful.
Some of the material in this book has already been published in Tanya’s many blogs and YouTube videos. However, Alice & Bob expands on that information with relatable examples that really drive her points home and then builds on them with so much new, complementary material.
This book was written specifically for anyone interested in securing their web applications. Note that web application security is not strictly the domain of the security department. Software developers should read it. And if you’re a penetration tester (or want to be), you should have a firm understanding of how web applications work and how they can be exploited. Alice & Bob covers the most common vulnerabilities (i.e., OWASP Top 10) and gives advice on how to mitigate them. Application developers specifically need to understand how their code could be vulnerable and then plan ahead (i.e., ensure that their code is not vulnerable). Penetration testers need to understand the tech behind these flaws so they can try to exploit them. Essentially, you need to know how your adversary thinks in order to defeat them. This book is also useful for anyone working in or considering a career in DevSecOps.
A couple of years ago, my employer needed someone on our security team to start testing our web applications. I was already learning penetration testing, so I jumped on the opportunity. I have done plenty of web development throughout my career, and I really enjoyed it, so application security was a natural fit. I also needed to learn about secure coding. Penetration testers can’t just hand developers a list of findings and 500-page scan results and hope for the best. That’s an easy way to lose the support of the development staff. Instead, they need to offer suggestions on how to remediate vulnerabilities and then educate developers on the proper ways in which to write secure code. I research the vulnerabilities I discover so I can present our developers with ways in which they can correct the flaws. The research also helps me to state my case when trying to convince a developer, and more importantly senior management, that a vulnerability must be addressed. My research led me more and more to Tanya’s blogs. That’s when I realized just how great a resource she is. I started using and referring to her blog posts when making recommendations to the developers.
Part I: What You Must Know to Write Code Safe Enough to Put on the Internet
This section emphasizes the importance of developing a solid understanding of information security concepts while giving you a basic security education. Topics include the CIA Triad, threat modeling, defense in depth, and the characteristics of a good application security program. If you work in security, essentially, your job boils down to protecting the Confidentiality, Integrity, and Availability (CIA) of your data. CIA is referenced throughout the book with examples of how it should be protected.
Other topics in this section include software project requirements as they relate to security, encryption, input validation, third-party components, cookie security, and insider threats; very descriptive depictions of cross-site request forgery (CSRF) and server-side request forgery (SSRF); secure coding and design; a detailed description of OWASP and its offerings; session management, etc.
One very important topic that Tanya spends a lot of time on is the need to use security headers. This section goes into amazing detail on ALL of the security headers and how to configure them.
Part II: What You Should Do to Create Very Good Code
This section takes things a step further with discussions on the importance of secure code review and especially peer review including descriptions of the many types of code review and testing types (e.g., SAST, DAST, SCA, etc.). Also covered is the need to test your applications, database, and infrastructure via manual and automated methods followed by proper (i.e., secure) deployment.
Chapter 7 contains a particularly helpful dissection of a mature application security program, covering essential topics such as application inventory (Can’t secure what you don’t know exists!), developer education, fully integrating security into the SDLC, and incident response. There’s even a brief discussion on the proper tools to use when testing.
Chapter 8 provides an extremely in-depth narrative on what encompasses modern web applications and how to secure them.
Part III: Helpful Information on How to Continue to Create Very Good Code
Alice & Bob culminates with general tips on password management, multi-factor authentication, application inventory, incident response, and other items you can use in your everyday work and life, followed by the appropriately titled Chapter 10 Continuous Learning, which emphasizes just that. It gives advice on how to continue your education and grow as a security analyst. It also includes a great template for creating your learning plan. And of course, no guide on security and advancing in the profession would be complete without a mention of soft skills. I’ve worked with too many people who were technical geniuses but couldn’t relate to their co-workers. Having worked as a technical writer for many years, I learned that one of the most important aspects of technical communication is to play to your audience. It’s so important that you, as a security analyst, find the proper methods in which to communicate with the other members of your staff (especially senior management) and your clients.
Finally, Chapter 11 ties everything together and correctly states that security is the job of the entire organization and not just the security team. Every member of the organization has a part to play. If you work in security, you have to convince your team, staff, clients, etc., using facts, demonstrations (i.e., proof of concept) and numbers (i.e., costs), that your findings are real and important. There has to be substance behind your motives. Otherwise, you won’t be taken seriously.
TL;DR AKA Conclusion
Alice & Bob Learn Application Security is a very well-thought out study guide that will help you learn the many intricacies of application security. I highly recommend it for anyone working (or anyone who wants to work) in web application development, DevOps, DevSecOps, or penetration testing.
You may look at all of this and feel overwhelmed. That’s why Alice & Bob Learn Application Security was written in such a logical sequence. If you’re new, just start at the beginning and work your way through at your own pace. And don’t be afraid to ask questions. If you already have experience, take what you need to fill in the gaps.
If you like this book, check out Tanya’s website and her YouTube channel.
Top reviews from other countries
Reviewed in Brazil on November 16, 2020












