Download App
>> | LShop | >> | Book | >> | Computing & Informat... | >> | Computer Security | >> | The Security Develop... |
ISBN
:
9780735622142
Publisher
:
Microsoft Press
Subject
:
Computer Security
Binding
:
Paperback
Pages
:
320
Year
:
2006
₹
3282.0
₹
2330.0
Buy Now
Shipping charges are applicable for books below Rs. 101.0
View DetailsEstimated Shipping Time : 5-7 Business Days
View DetailsDescription
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs—the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team guide you through each stage of the SDL—from education and design to testing and post-release. You get their first-hand insights, best practices, a practical history of the SDL, and lessons to help you implement the SDL in any development organization.Discover how to: Use a streamlined risk-analysis process to find security design issues before code is committed Apply secure-coding best practices and a proven testing process Conduct a final security review before a product ships Arm customers with prescriptive guidance to configure and deploy your product more securely Establish a plan to respond to new security vulnerabilities Integrate security discipline into agile methods and processes, such as Extreme Programming and Scrum Includes a CD featuring: A six-part security class video conducted by the authors and other Microsoft security experts Sample SDL documents and fuzz testing tool PLUS—Get book updates on the Web.A Note Regarding the CD or DVDThe print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.
Related Items
-
of
Hacker Techniques, Tools, and Incident Handling (Jones & Bartlett Learning Information Systems Security & Assurance Series)
Sean-Philip Oriyano
Starts At
8880.0
11685.0
24% OFF
Internet Security: Hacking, Counterhacking, and Security
Kenneth Einar Himma
Starts At
2625.0
3241.0
19% OFF
Information Security Management Handbook, Volume 2
Harold F. Tipton
Starts At
17164.0
19959.0
14% OFF
The Handbook of Business Security: A Practical Guide to Managing the Risk
Starts At
3241.0
4265.0
24% OFF
Fundamentals o Information Systems Security (Information Systems Security & Assurance Series) (Jones & Bartlett Learning Information Systems & Assurance)
David Kim
Starts At
14813.0
19491.0
24% OFF
Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers (PSI Business Security)
Philip Alexander
Starts At
572.0
795.0
28% OFF
Foundations of Security: What Every Programmer Needs to Know
Christoph Kern
Starts At
314.0
349.0
10% OFF
Build Your Own Security Lab: A Field Guide For Network Testing (With CD)
Michael Gregg
Starts At
379.0
499.0
24% OFF
Cryptography And Security
C K Shyamala N Harini Dr T R Padmanabhan
Starts At
521.0
669.0
22% OFF
The Web Application Hacker's Handbook: Finding And Exploiting Security Flaws
Dafydd Stuttard
Starts At
615.0
799.0
23% OFF
Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives
Sunit Belapure Nina Godbole
Starts At
663.0
809.0
18% OFF
Cloud Security: A Comprehensive Guide To Secure Cloud Computing
Russell Dean Vines Ronald L. Krutz
Starts At
580.0
699.0
17% OFF