Software Security Engineering: A Guide for Project Managers
368 pages; Addison-Wesley Professional; 1 edition (May 11, 2008)
Language: English; ISBN-10: 032150917X; ISBN-13: 978-0321509178
Software that is developed from the beginning with security in mind will resist, tolerate, and recover from attacks more effectively than would otherwise be possible.
Security Software Development: Assessing and Managing Security Risks by Douglas A. Ashbaugh
Publisher: Auerbach Publications; 1 edition (October 23, 2008)
321 pages; Language: English
ISBN-10: 1420063804
ISBN-13: 978-1420063806
Examining current trends and problems that have plagued application development for more than a decade, this book provides a foundation for security risk assessment and management during software development. It demonstrates how to achieve greater application security through assessing and managing risk throughout the entire software development life cycle using a test case based on the author’s personal experience in software development. The book covers methods used to assess risk, discussing the pros and cons of each method. Readers are then guided through each step of the process. The book concludes with discussions of how to sustain a risk assessment and risk management process within an organization.
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know by John Viega
Publisher: O'Reilly Media; 1 edition (June 19, 2009)
264 pages; Language: English
ISBN-10: 0596523025
ISBN-13: 978-0596523022
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue.
Why is security so bad? With many more people online than just a few years ago, there are more attackers -- and they're truly motivated. Attacks are sophisticated, subtle, and harder to detect than ever. But, as Viega notes, few people take the time to understand the situation and protect themselves accordingly. This book tells you:
|
Программирование для чайников.
|