03447oam 2200661I 450 991078895820332120200520144314.00-429-15214-01-4987-5961-01-4398-2697-810.1201/EBK1439826966 (CKB)3400000000001957(EBL)1446770(SSID)ssj0000546013(PQKBManifestationID)11334381(PQKBTitleCode)TC0000546013(PQKBWorkID)10494685(PQKB)10847028(Au-PeEL)EBL1446770(CaPaEBR)ebr11002699(CaONFJC)MIL692502(OCoLC)669019701(CaSebORM)9781439826973(MiAaPQ)EBC1446770(EXLCZ)99340000000000195720180331d2010 uy 0engur|n|---|||||txtccrSecure and resilient software development /Mark S. Merkow, Lakshmikanth Raghavan1st editionBoca Raton, Fla. :CRC Press,2010.1 online resource (385 p.)An Auerback book."1-322-61220-X 1-4398-2696-X Includes bibliographical references and index.Cover; Title; Copyright; Contents; Preface; About the Authors; Acknowledgments; Chapter 1: How Does Software Fail Thee? Let Us Count the Ways; Chapter 2: Characteristics of Secure and Resilient Software; Chapter 3: Security and Resilience in the Software Development Life Cycle; Chapter 4: Proven Best Practices for Resilient Applications; Chapter 5: Designing Applications for Security and Resilience; Chapter 6: Programming Best Practices; Chapter 7: Special Considerations for Embedded Systems, Cloud Computing, and Mobile Computing DevicesChapter 8: Security Testing of Custom Software ApplicationsChapter 9: Testing Commercial off-the-Shelf Systems; Chapter 10: Implementing Security and Resilience Using CLASP; Chapter 11: Metrics and Models for Security and Resilience Maturity; Chapter 12: Taking It to the Streets; Glossary; Appendix A: 2010 CWE/SANS Top 25 Most Dangerous Programming Errors; Appendix B: Enterprise Security APIAlthough many software books highlight open problems in secure software development, few provide easily actionable, ground-level solutions. Breaking the mold, Secure and Resilient Software Development teaches you how to apply best practices and standards for consistent and secure software development. It details specific quality software development strategies and practices that stress resilience requirements with precise, actionable, and ground-level inputs. Providing comprehensive coverage, the book illustrates all phases of the secure software development life cycle. It shows developers howComputer softwareDevelopmentComputer softwareReliabilityComputer securityComputer softwareDevelopment.Computer softwareReliability.Computer security.005.8Merkow Mark S.1463829Raghavan Lakshmikanth1463830MiAaPQMiAaPQMiAaPQBOOK9910788958203321Secure and resilient software development3673297UNINA