did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781420087840

Architecting Secure Software Systems

by ;
  • ISBN13:

    9781420087840

  • ISBN10:

    1420087843

  • Format: Hardcover
  • Copyright: 2008-12-17
  • Publisher: Auerbach Public

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $86.95 Save up to $40.57
  • Rent Book $65.21
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-5 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments. Finally, they explore the security of telecommunications and other distributed services through Service Oriented Architecture (SOA). The book employs a versatile multi-platform approach which allows users to seamlessly integrate the material into their own programming paradigm regardless of their individual programming backgrounds. The text also provides real-world code snippets for experimentation.

Table of Contents

Security in Software Systems
Need for Computer Security-á Vulnerability and Attacks Various Security
Attacks-á Computer Security Counter
External Threats-á Security
Programming Database Security-á
Common Criteria-á Security
Standards-á -á Architecting Secure Software Systems
Building Secured System Security
Requirements Analysis Threat Modeling Security
Design-á Security
Coding-á Safe Programming Security
Review-á Generating the Executable-á Security
Testing-á Secured Deployment-á Security
Remediation-á Security
Documentation Security
Response Planning Safety-Critical Systems Constructing Secured and Safe C/UNIX Programs UNIX and Linux
History UNIX and Linux Security
Privileges in UNIX Secure
Network Programming UNIX Virtualization-á UNIX Security Logging C/C++ Language-á Common Security Problems with C/C++ Avoiding Security
Risks with C/C++ Code Some Coding Rules -á Constructing Secured Systems in NET Overview of .NET 3.0
Common Language Runtime NET
Runtime Security NET
Security Architecture Identity and Principal Permission Code Access Security Role-Based Security Type Safety and Security ASP.NET
Security NET Remoting
Security Windows Security Networking and Service-Oriented
ArchitectureG++Based Security
Networking and Open Systems Interconnection Model
Transmission Control Protocol/Internet Protocol Primer
Security Using Sockets Service-Oriented
Architecture Remote Procedure Call Remote Method Invocation Security-á Common Object
Request Broker Architecture Security
Securing ActiveX Control-á Distributed Component Object Model Security-á -á
Java Client-Side Security
Java Framework Java Platform Security-á
The Java Cryptography Application Programming Interface-á Java Secure
Sockets Extension-á Authentication and Access Control-á Java
Sandbox Java
Applets Security Java
Swing-á -á Security in Mobile Applications Mobile Computing-á
Networks Next Generation Networks-á Next
Generation Network Security-á Mobile
Applications-á Security in Mobile
Computing Scenario Java 2 Micro Edition Security-á
Java Card and Universal Subscriber Identity Module Security-á Wireless
Application Protocol Security-á
Security Implementation in Windows Mobile-á
Mobile Agents-á Mobile Ad Hoc Network Security
Digital Rights Management-á -á
Security in Web-Facing Applications-á
Overview of Web Security-á Identity Management Public Key
Infrastructure-á Trust in Service Emerging Security Technologies-á Code
Injection Parameter Tampering-á Cross-Site
Scripting-á File Disclosure-á
Next Generation Webs-á
Next Generation Web Security Secured Web Programming
Application Vulnerability
Description Language -á Server-Side Java Security
Server-Side Java Servlet Security-á
Securing Java Server Pages Java Struts Security
Java Server Faces Security
Web Application Development Rules Securing
Enterprise JavaBeans Constructing Secured Web Services
Web Services
Security-á &
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program