did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781449626327

Secure Software Design

by ;
  • ISBN13:

    9781449626327

  • ISBN10:

    1449626327

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2012-03-08
  • Publisher: Jones & Bartlett Learning

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
  • Buyback Icon We Buy This Book Back!
    In-Store Credit: $20.37
    Check/Direct Deposit: $19.40
    PayPal: $19.40
List Price: $177.94 Save up to $108.77
  • Buy Used
    $133.46
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

With the multitude of existing attacks that are known to date and the number that will continue to emerge, software security is in a reactive state and many have predicted that it will remain so for the foreseeable future; this book seeks to change that opinion by presenting a practical guide to proactive software security. Secure Software Design is written for the student, the developer, and management to bring a new way of thinking to secure software design. The focus of this book is on analyzing risks, understanding likely points of attack, and pre-deciding how your software will deal with the attack that will inevitably arise. By looking at the systemic threats in any deployment environment and studying the vulnerabilities of your application, this book will show you how to construct software that can deal with attacks both known and unknown instead of waiting for catastrophe and the cleanup efforts of tomorrow. Hands-on examples and simulated cases for the novice and the professional support each chapter by demonstrating the principles presented.

Table of Contents

PartPart I Background and Introduction
ChapterChapter 1 Introduction
ChapterChapter 2 Current and Emerging Threats
PartPart II Systemic Threats
ChapterChapter 3 The Network Environment
ChapterChapter 4 The Operating System Environment
ChapterChapter 5 The Database Environment
ChapterChapter 6 Programming Languages
PartPart III Secure Software Design
ChapterChapter 7 Security Requirements Planning
ChapterChapter 8 Vulnerability Mapping
ChapterChapter 9 Development and Implementation
ChapterChapter 10 Application Review and Testing
ChapterChapter 11 Incorporating SSD with the SDLC
PartPart IV Redefining Security
ChapterChapter 12 Personnel Training
ChapterChapter 13 A Culture of Security
PartPart V Advanced Threat Analysis
ChapterChapter 14 Web Application Threats
ChapterChapter 15 Secure Data Management
ChapterChapter 16 Zero Day and Beyond

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program