Security Software Development

Regular price €112.99
Quantity:
Delivery/Collection within 10-20 working days
Shipping & Delivery
A01=CISSP
A01=CISSP Ashbaugh
accreditation
Anti-virus
Anti-virus Software
application threat modeling
asset identification process
Author_CISSP
Author_CISSP Ashbaugh
authorization
Buffer Overflows
Category=UBL
Category=UMX
Category=UMZ
Category=UR
Category=UY
controls
DB2 Database
Douglas A. Ashbaugh
eq_bestseller
eq_computing
eq_isMigrated=1
eq_isMigrated=2
eq_nobargain
eq_non-fiction
Error Log Files
information
Information Security
Information System Owner
Injection Flaws
Mainframe Service
management
OWASP
owner
package
Pci DSS
Pci Security Standard Council
plan
Qualitative Risk Analysis
qualitative risk evaluation
Retirement Benefits
risk
Risk Mitigation
Risk Mitigation Strategies
secure coding practices
secure software risk management strategies
Sensitive Information
Software Development Effort
software lifecycle security
SQL Injection
SQL Injection Vulnerability
SSP
system
Threat Action
Threat Sources
Threat Vulnerability Pair
User Id
vulnerability assessment techniques

Product details

  • ISBN 9781420063806
  • Weight: 680g
  • Dimensions: 156 x 234mm
  • Publication Date: 23 Oct 2008
  • Publisher: Taylor & Francis Ltd
  • Publication City/Country: GB
  • Product Form: Hardback
Secure checkout Fast Shipping Easy returns

Threats to application security continue to evolve just as quickly as the systems that protect against cyber-threats. In many instances, traditional firewalls and other conventional controls can no longer get the job done. The latest line of defense is to build security features into software as it is being developed.

Drawing from the author’s extensive experience as a developer, Secure Software Development: Assessing and Managing Security Risks illustrates how software application security can be best, and most cost-effectively, achieved when developers monitor and regulate risks early on, integrating assessment and management into the development life cycle. This book identifies the two primary reasons for inadequate security safeguards: Development teams are not sufficiently trained to identify risks; and developers falsely believe that pre-existing perimeter security controls are adequate to protect newer software. Examining current trends, as well as problems that have plagued software security for more than a decade, this useful guide:



  • Outlines and compares various techniques to assess, identify, and manage security risks and vulnerabilities, with step-by-step instruction on how to execute each approach




  • Explains the fundamental terms related to the security process




  • Elaborates on the pros and cons of each method, phase by phase, to help readers select the one that best suits their needs


Despite decades of extraordinary growth in software development, many open-source, government, regulatory, and industry organizations have been slow to adopt new application safety controls, hesitant to take on the added expense. This book improves understanding of the security environment and the need for safety measures. It shows readers how to analyze relevant threats to their applications and then implement time- and money-saving techniques

Ashbaugh, CISSP

More from this author