Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Rugged Software: A Value Based Strategy for Improving Our Digital Infrastructure

Type
Slides
Tags
software development
Authors
Josh Corman
Event
Source Conference Boston 2010
Indexed on
Mar 26, 2013
URL
http://www.sourceconference.com/bos10pubs/Rugged%20Software%20Development_20100311(2).pdf
File name
Rugged%20Software%20Development_20100311(2).pdf
File size
7.5 MB
MD5
39f73bb91629afc5c0705d240a116c53
SHA1
438d1fdaaae7a15977869040497662465355bd4f

Software has become modern infrastructure. Though we have made progress with tools and frameworks in the security community, too few outside of security recognize the security context of this digital infrastructure and the awesome responsibility that comes with developing it. Rugged is a meme - a contagious value set aimed to reach the hearts and minds of the masses who create software, purchase software, and depend upon software. We've been working hard fighting the heads of the Hydra. It's time to fight smarter and better focus on the heart. Digital infrastructure needs software that is not only agile, but also Rugged. Rugged software is capable of withstanding hostile actions and hostile environments while delivering business value. Rugged Software Development provides a philosophical foundation for regularly and consistently creating resilient, survivable software. Rugged guides software developers to create better software without the draconian notion of security police breathing down their necks. Rugged is a value system, not a compliance system. In a technology-dependent world, software needs to be Rugged. Read the Rugged Manifesto at www.ruggedsoftware.org for more information. Rugged is just beginning.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !