|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910812392503321 |
|
|
Autore |
Merkow Mark S. |
|
|
Titolo |
Secure and resilient software development / / Mark S. Merkow, Lakshmikanth Raghavan |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Boca Raton, Fla. : , : CRC Press, , 2010 |
|
|
|
|
|
|
|
ISBN |
|
0-429-15214-0 |
1-4987-5961-0 |
1-4398-2697-8 |
|
|
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (385 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer software - Development |
Computer software - Reliability |
Computer security |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Title; Copyright; Contents; Preface; About the Authors; Acknowledgments; Chapter 1: How Does Software Fail Thee? Let Us Count the Ways; Chapter 2: Characteristics of Secure and Resilient Software; Chapter 3: Security and Resilience in the Software Development Life Cycle; Chapter 4: Proven Best Practices for Resilient Applications; Chapter 5: Designing Applications for Security and Resilience; Chapter 6: Programming Best Practices; Chapter 7: Special Considerations for Embedded Systems, Cloud Computing, and Mobile Computing Devices |
Chapter 8: Security Testing of Custom Software ApplicationsChapter 9: Testing Commercial off-the-Shelf Systems; Chapter 10: Implementing Security and Resilience Using CLASP; Chapter 11: Metrics and Models for Security and Resilience Maturity; Chapter 12: Taking It to the Streets; Glossary; Appendix A: 2010 CWE/SANS Top 25 Most Dangerous Programming Errors; Appendix B: Enterprise Security API |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Although many software books highlight open problems in secure software development, few provide easily actionable, ground-level solutions. Breaking the mold, Secure and Resilient Software Development teaches you how to apply best practices and standards |
|
|
|
|
|
|
|
|
|
|
for consistent and secure software development. It details specific quality software development strategies and practices that stress resilience requirements with precise, actionable, and ground-level inputs. Providing comprehensive coverage, the book illustrates all phases of the secure software development life cycle. It shows developers how |
|
|
|
|
|
| |