At this point in the book, we have examined specific techniques and approaches to developing secure and resilient software under the shift left and build security in paradigms for a variety of platforms and specialized applications, with a focus on preventing the most common errors and problems that lead to security incidents and data losses.