๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Secure and Resilient Software Development

โœ Scribed by Raghavan, Lakshmikanth; Merkow, Mark S.


Publisher
CRC Press/Auerbach Publications
Year
2010
Tongue
English
Leaves
380
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Although many software books highlight open problems in secure software development, few provide easily actionable, ground-level solutions. Breaking the mold, Secure and Resilient Software Development teaches you how to apply best practices and standards for consistent and secure software development. It details specific quality software development strategies and practices that stress resilience requirements with  Read more...

โœฆ Table of Contents


Cover
Title
Copyright
Contents
Preface
About the Authors
Acknowledgments
Chapter 1: How Does Software Fail Thee? Let Us Count the Ways
Chapter 2: Characteristics of Secure and Resilient Software
Chapter 3: Security and Resilience in the Software Development Life Cycle
Chapter 4: Proven Best Practices for Resilient Applications
Chapter 5: Designing Applications for Security and Resilience
Chapter 6: Programming Best Practices
Chapter 7: Special Considerations for Embedded Systems, Cloud Computing, and Mobile Computing Devices. Chapter 8: Security Testing of Custom Software ApplicationsChapter 9: Testing Commercial off-the-Shelf Systems
Chapter 10: Implementing Security and Resilience Using CLASP
Chapter 11: Metrics and Models for Security and Resilience Maturity
Chapter 12: Taking It to the Streets
Glossary
Appendix A: 2010 CWE/SANS Top 25 Most Dangerous Programming Errors
Appendix B: Enterprise Security API.


๐Ÿ“œ SIMILAR VOLUMES


Secure, Resilient, and Agile Software De
โœ Mark Merkow (Author) ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› Auerbach Publications

<p>A collection of best practices and effective implementation recommendations that are proven to work, <b>Secure, Resilient, and Agile Software Development</b>leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software

Security Chaos Engineering: Sustaining R
โœ Kelly Shortridge, Aaron Rinehart ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› O'Reilly Media ๐ŸŒ English

<p><span>Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How ca

Security Chaos Engineering: Sustaining R
โœ Kelly Shortridge, Aaron Rinehart ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› O'Reilly Media ๐ŸŒ English

<p><span>Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How ca

Security Chaos Engineering: Sustaining R
โœ Kelly Shortridge ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› O'Reilly Media ๐ŸŒ English

Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we veri

Security Chaos Engineering: Sustaining R
โœ Kelly Shortridge, Aaron Rinehart ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› O'Reilly Media ๐ŸŒ English

<p><span>Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How ca