
Security
Security is not a feature you bolt on at the end—it is a discipline that shapes how you design, build, and operate every system. This hub collects resources on network defense, penetration testing, enterprise security management, and the fundamental concepts that every developer and administrator needs. You will find practical reading lists with chapter breakdowns, skill-level tags, and paths to build real security competence.
Starter Path
Structured introduction to application and infrastructure security.
Application Security Path →Curated Reading List
Counter-Hack Reloaded
Step-by-step network attack methodology and defensive countermeasures. Covers reconnaissance, scanning, exploitation, and maintaining access—from the defender's perspective.
Enterprise Security: The Manager's Defense Guide
Security strategy for organizations—risk assessment, policy development, incident response planning, and building security-aware teams.
Recent Updates
SBOM + SLSA: Minimal Supply-Chain Security for Small Teams
How small teams can implement meaningful supply-chain security. Covers generating SBOMs, reaching SLSA Level 2, dependency scanning, and provenance verification.
Passkeys in 2026: WebAuthn Implementation and Account Recovery
Practical guide to implementing passkeys with WebAuthn. Covers browser support, server-side relying party setup, account recovery flows, and migration from passwords.
Secure by Design: CISA Pledge Sprint Plan
How to turn the CISA Secure by Design pledge into concrete engineering sprints. Covers memory-safe languages, default MFA, vulnerability disclosure, and measurement.
OWASP Top 10 (2025): Developer Checklist and Fixes
A developer-focused walkthrough of the OWASP Top 10 2025 edition. Each risk category includes detection techniques, code-level fixes, and testing approaches.
How to Use This Hub
- → Start with the Application Security Path for a structured introduction
- → Technical readers should begin with Counter-Hack Reloaded for hands-on methodology
- → Managers and team leads benefit from the Enterprise Security guide for policy and process
- → Linux security overlaps heavily—see our Linux hub for server-side fundamentals