Title:
Software security : building security in
Author:
McGraw, Gary, 1966-
ISBN:
9780321356703
Personal Author:
Publication Information:
Harlow : Addison-Wesley Professional, 2006.
Physical Description:
xxxvi, 408 p. : ill. ; 24 cm + 1 CD-ROM (4 3/4 in.).
Series:
Addison-Wesley software security series.
Addison-Wesley software security series
Addison-Wesley software security series. o2006021146 o2006021146
Addison-Wesley software security series o2006021146 o2006021146
General Note:
Formerly CIP.
Contents:
1. Defining a discipline -- 2. A risk management framework -- 3. Introduction to software security touchpoints -- 4. Code review with a tool -- 5. Architectural risk analysis -- 6. Software penetration testing -- 7. Risk-based security testing -- 8. Abuse cases -- 9. Software security meets security operations -- 10. An enterprise software security program -- 11. Knowledge for software security -- 12. A taxonomy of coding errors -- 13. Annotated bibliography and references -- App. A. Fortify source code analysis suite tutorial -- App. B. ITS4 rules -- App. C. An exercise in risk analysis : Smurfware.
Abstract:
"Beginning where the best-selling book Building Secure Software left off, Software Security teaches you how to put software security into practice. The software security best practices, or touchpoints, described in this book have their basis in good software engineering and involve explicitly pondering security throughout the software development lifecycle. This means knowing and understanding common risks (including implementation bugs and architectural flaws), designing for security, and subjecting all software artifacts to thorough, objective risk analyses and testing.".
"Software Security is about putting the touchpoints to work for you. Because you can apply these touchpoints to the software artifacts you already produce as you develop software, you can adopt this book's methods without radically changing the way you work. In addition to the touchpoints, Software Security covers knowledge management, training and awareness, and enterprise-level software security programs."--BOOK JACKET.
Subject Term:
Electronic Access:
Table of contents only http://www.loc.gov/catdir/toc/ecip062/2005031598.html