|
|
Showing 1 - 6 of
6 matches in All Departments
As long as humans write software, the key to successful software
security is making the software development program process more
efficient and effective. Although the approach of this textbook
includes people, process, and technology approaches to software
security, Practical Core Software Security: A Reference Framework
stresses the people element of software security, which is still
the most important part to manage as software is developed,
controlled, and exploited by humans. The text outlines a
step-by-step process for software security that is relevant to
today's technical, operational, business, and development
environments. It focuses on what humans can do to control and
manage a secure software development process using best practices
and metrics. Although security issues will always exist, students
learn how to maximize an organization's ability to minimize
vulnerabilities in software products before they are released or
deployed by building security into the development process. The
authors have worked with Fortune 500 companies and have often seen
examples of the breakdown of security development lifecycle (SDL)
practices. The text takes an experience-based approach to apply
components of the best available SDL models in dealing with the
problems described above. Software security best practices, an SDL
model, and framework are presented in this book. Starting with an
overview of the SDL, the text outlines a model for mapping SDL best
practices to the software development life cycle (SDLC). It
explains how to use this model to build and manage a mature SDL
program. Exercises and an in-depth case study aid students in
mastering the SDL model. Professionals skilled in secure software
development and related tasks are in tremendous demand today. The
industry continues to experience exponential demand that should
continue to grow for the foreseeable future. This book can benefit
professionals as much as students. As they integrate the book's
ideas into their software security practices, their value increases
to their organizations, management teams, community, and industry.
As long as humans write software, the key to successful software
security is making the software development program process more
efficient and effective. Although the approach of this textbook
includes people, process, and technology approaches to software
security, Practical Core Software Security: A Reference Framework
stresses the people element of software security, which is still
the most important part to manage as software is developed,
controlled, and exploited by humans. The text outlines a
step-by-step process for software security that is relevant to
today's technical, operational, business, and development
environments. It focuses on what humans can do to control and
manage a secure software development process using best practices
and metrics. Although security issues will always exist, students
learn how to maximize an organization's ability to minimize
vulnerabilities in software products before they are released or
deployed by building security into the development process. The
authors have worked with Fortune 500 companies and have often seen
examples of the breakdown of security development lifecycle (SDL)
practices. The text takes an experience-based approach to apply
components of the best available SDL models in dealing with the
problems described above. Software security best practices, an SDL
model, and framework are presented in this book. Starting with an
overview of the SDL, the text outlines a model for mapping SDL best
practices to the software development life cycle (SDLC). It
explains how to use this model to build and manage a mature SDL
program. Exercises and an in-depth case study aid students in
mastering the SDL model. Professionals skilled in secure software
development and related tasks are in tremendous demand today. The
industry continues to experience exponential demand that should
continue to grow for the foreseeable future. This book can benefit
professionals as much as students. As they integrate the book's
ideas into their software security practices, their value increases
to their organizations, management teams, community, and industry.
"... an engaging book that will empower readers in both large and
small software development and engineering organizations to build
security into their products. ... Readers are armed with firm
solutions for the fight against cyber threats."-Dr. Dena Haritos
Tsamitis. Carnegie Mellon University"... a must read for security
specialists, software developers and software engineers. ... should
be part of every security professional's library." -Dr. Larry
Ponemon, Ponemon Institute"... the definitive how-to guide for
software security professionals. Dr. Ransome, Anmol Misra, and
Brook Schoenfield deftly outline the procedures and policies needed
to integrate real security into the software development process.
...A must-have for anyone on the front lines of the Cyber War ..."
-Cedric Leighton, Colonel, USAF (Ret.), Cedric Leighton
Associates"Dr. Ransome, Anmol Misra, and Brook Schoenfield give you
a magic formula in this book - the methodology and process to build
security into the entire software development life cycle so that
the software is secured at the source! "-Eric S. Yuan, Zoom Video
CommunicationsThere is much publicity regarding network security,
but the real cyber Achilles' heel is insecure software. Millions of
software vulnerabilities create a cyber house of cards, in which we
conduct our digital lives. In response, security people build ever
more elaborate cyber fortresses to protect this vulnerable
software. Despite their efforts, cyber fortifications consistently
fail to protect our digital treasures. Why? The security industry
has failed to engage fully with the creative, innovative people who
write software. Core Software Security expounds developer-centric
software security, a holistic process to engage creativity for
security. As long as software is developed by humans, it requires
the human element to fix it. Developer-centric security is not only
feasible but also cost effective and operationally relevant. The
methodology builds security into software development, which lies
at the heart of our cyber infrastructure. Whatever development
method is employed, software must be secured at the source. Book
Highlights: Supplies a practitioner's view of the SDL Considers
Agile as a security enabler Covers the privacy elements in an SDL
Outlines a holistic business-savvy SDL framework that includes
people, process, and technology Highlights the key success factors,
deliverables, and metrics for each phase of the SDL Examines cost
efficiencies, optimized performance, and organizational structure
of a developer-centric software security program and PSIRT Includes
a chapter by noted security architect Brook Schoenfield who shares
his insights and experiences in applying the book's SDL framework
View the authors' website at http://www.androidinsecurity.com/
Android Security: Attacks and Defenses is for anyone interested in
learning about the strengths and weaknesses of the Android platform
from a security perspective. Starting with an introduction to
Android OS architecture and application programming, it will help
readers get up to speed on the basics of the Android platform and
its security issues. Explaining the Android security model and
architecture, the book describes Android permissions, including
Manifest permissions, to help readers analyze applications and
understand permission requirements. It also rates the Android
permissions based on security implications and covers JEB
Decompiler. The authors describe how to write Android bots in JAVA
and how to use reversing tools to decompile any Android
application. They also cover the Android file system, including
import directories and files, so readers can perform basic forensic
analysis on file system and SD cards. The book includes access to a
wealth of resources on its website: www.androidinsecurity.com. It
explains how to crack SecureApp.apk discussed in the text and also
makes the application available on its site. The book includes
coverage of advanced topics such as reverse engineering and
forensics, mobile device pen-testing methodology, malware analysis,
secure coding, and hardening guidelines for Android. It also
explains how to analyze security implications for Android mobile
devices/applications and incorporate them into enterprise SDLC
processes. The book's site includes a resource section where
readers can access downloads for applications, tools created by
users, and sample applications created by the authors under the
Resource section. Readers can easily download the files and use
them in conjunction with the text, wherever needed. Visit
www.androidinsecurity.com for more information.
Android Security: Attacks and Defenses is for anyone interested in
learning about the strengths and weaknesses of the Android platform
from a security perspective. Starting with an introduction to
Android OS architecture and application programming, it will help
readers get up to speed on the basics of the Android platform and
its security issues. Explaining the Android security model and
architecture, the book describes Android permissions, including
Manifest permissions, to help readers analyze applications and
understand permission requirements. It also rates the Android
permissions based on security implications and covers JEB
Decompiler. The authors describe how to write Android bots in JAVA
and how to use reversing tools to decompile any Android
application. They also cover the Android file system, including
import directories and files, so readers can perform basic forensic
analysis on file system and SD cards. The book includes access to a
wealth of resources on its website: www.androidinsecurity.com. It
explains how to crack SecureApp.apk discussed in the text and also
makes the application available on its site. The book includes
coverage of advanced topics such as reverse engineering and
forensics, mobile device pen-testing methodology, malware analysis,
secure coding, and hardening guidelines for Android. It also
explains how to analyze security implications for Android mobile
devices/applications and incorporate them into enterprise SDLC
processes. The book's site includes a resource section where
readers can access downloads for applications, tools created by
users, and sample applications created by the authors under the
Resource section. Readers can easily download the files and use
them in conjunction with the text, wherever needed. Visit
www.androidinsecurity.com for more information.
First and foremost, Ransome and Misra have made an engaging book
that will empower readers in both large and small software
development and engineering organizations to build security into
their products. This book clarifies to executives the decisions to
be made on software security and then provides guidance to managers
and developers on process and procedure. Readers are armed with
firm solutions for the fight against cyber threats. -Dr. Dena
Haritos Tsamitis. Carnegie Mellon University In the wake of cloud
computing and mobile apps, the issue of software security has never
been more important than today. This book is a must read for
security specialists, software developers and software engineers.
The authors do a brilliant job providing common sense approaches to
achieving a strong software security posture and should be part of
every security professional's library. -Dr. Larry Ponemon, Ponemon
Institute Finally, the definitive how-to guide for software
security professionals. Dr. Ransome, Anmol Misra, and Brook
Schoenfield deftly outline the procedures and policies needed to
integrate real security into the software development process.In an
age of ubiquitous malware, this volume shows how inadequate
traditional network security models are and why security needs to
be software and developer-centric if it is to be relevant. A
must-have for anyone on the front lines of the Cyber War -
especially software developers and those who work with them.
-Cedric Leighton, Colonel, USAF (Ret.), Cedric Leighton Associates
When it comes to software security, people usually think that the
solution is to hire a security expert to help you fix a security
issue or a hacker to identify vulnerabilities in the software. This
is typically a stop gap and workaround. Neither of these addresses
the root cause of software security. At its root, the cause lies
within the source code developed by software developers. Therefore,
security should be developer-centric, focused on the secure
development of the source code. Dr. Ransome, Anmol Misra, and Brook
Schoenfield give you a magic formula in this book - the methodology
and process to build security into the entire software development
life cycle so that the software is secured at the source -Eric S.
Yuan.Zoom Video Communications About the Book: There is much
publicity regarding network security, but the real cyber Achilles'
heel is insecure software. Millions of software vulnerabilities
create a cyber house of cards, in which we conduct our digital
lives. In response, security people build ever more elaborate cyber
fortresses to protect this vulnerable software. Despite their
efforts, cyber fortifications consistently fail to protect our
digital treasures. Why? The security industry has failed to engage
fully with the creative, innovative people who write software. Core
Software Security expounds developer-centric software security, a
holistic process to engage creativity for security. As long as
software is developed by humans, it requires the human element to
fix it. Developer-centric security is not only feasible but also
cost effective and operationally relevant. The methodology builds
security into software development, which lies at the heart of our
cyber infrastructure. Whatever development method is employed,
software must be secured at the source.Book Highlights: Supplies a
practitioner's view of the SDL Considers Agile as a security
enabler Covers the privacy elements in an SDL Outlines a holistic
business-savvy SDL framework that includes people, process, and
technology Highlights the key success factors, deliverables, and
metrics for each phase of the SDL Examines cost efficiencies,
optimized performance, and organizational structure of a
developer-centric software security program and PSIRT Includes a
chapter by noted security architect Brook Schoenfield who shares
his insights and experiences in applying the book's SDL framework
|
You may like...
The Car
Arctic Monkeys
CD
R398
Discovery Miles 3 980
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
|