The 7 Qualities of Highly Secure Software
Autor Mano Paulen Limba Engleză Hardback – 29 mai 2012
Each chapter details one of the seven qualities that can make your software highly secure and less susceptible to hacker threats. Leveraging real-world experiences and examples, the book:
- Explains complex security concepts in language that is easy to understand for professionals involved in management, software development, and operations
- Specifies the qualities and skills that are essential for building secure software
- Highlights the parallels between the habits of effective people and qualities in terms of software security
This will be required reading for my executives, security team, software architects and lead developers.
—David W. Stender, CISSP, CSSLP, CAP, CISO of the US Internal Revenue Service
Developing highly secure software should be at the forefront of organizational strategy and this book provides a framework to do so.
—Troy Leach, CTO, PCI Security Standards Council
This book will teach you the core, critical skills needed to raise the security bar on the attackers and swing the game in your favor.
—Michael Howard, Principal Cyber Security Program Manager, Microsoft
As a penetration tester, my job will be a lot harder as people read this book!
—Kevin Johnson, Security Consultant, Secure Ideas
Preț: 332.89 lei
Preț vechi: 486.19 lei
-32% Nou
Puncte Express: 499
Preț estimativ în valută:
63.72€ • 68.51$ • 53.12£
63.72€ • 68.51$ • 53.12£
Carte tipărită la comandă
Livrare economică 20 decembrie 24 - 03 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781439814468
ISBN-10: 1439814465
Pagini: 160
Ilustrații: 20 b/w images
Dimensiuni: 156 x 234 x 15 mm
Greutate: 0.41 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Locul publicării:Boca Raton, United States
ISBN-10: 1439814465
Pagini: 160
Ilustrații: 20 b/w images
Dimensiuni: 156 x 234 x 15 mm
Greutate: 0.41 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Locul publicării:Boca Raton, United States
Public țintă
Academic and Professional Practice & DevelopmentCuprins
Quality 1 - Security is Built In V s. Bolted On (Be Proactive). Quality 2 - Maps to a Plan (Begin with the End in Mind). Quality 3 - Includes Fundamental Necessities (Put First Things First). Quality 4- Is Balanced! (Think Win/Win). Quality 5 - Addresses Requirements (Seek First to Understand, Then to be Understood). Quality 6 - Collaborative Developed (Synergize). Quality 7 - Continuously Improves (Sharpen the Saw).
Recenzii
This will be required reading for my executives, security team, software architects and lead developers.
—David W. Stender, CISSP, CSSLP, CAP, CISO of the US Internal Revenue Service
Developing highly secure software should be at the forefront of organizational strategy and this book provides a framework to do so.
—Troy Leach, CTO, PCI Security Standards Council
This book will teach you the core, critical skills needed to raise the security bar on the attackers and swing the game in your favor.
—Michael Howard, Principal Cyber Security Program Manager, Microsoft
As a penetration tester, my job will be a lot harder as people read this book!
—Kevin Johnson, Security Consultant, Secure Ideas
At 130 pages, the book quickly focuses on the core points of the issue. Paul writes in an easy to read and understand style. With the use of various stories and examples; the need for secure software development is undeniable. ... The 7 Qualities of Highly Secure Software highlights the qualities that are essential and critical to stop insecure code. This is a highly valuable book that can be of significant use to every stakeholder—from those in the boardroom to the developers and head of application development. Ultimately, this is a book you want all of your software developers to read.
—Ben Rothke, CISSP, CISA, Information Security Manager, Wyndham Worldwide
—David W. Stender, CISSP, CSSLP, CAP, CISO of the US Internal Revenue Service
Developing highly secure software should be at the forefront of organizational strategy and this book provides a framework to do so.
—Troy Leach, CTO, PCI Security Standards Council
This book will teach you the core, critical skills needed to raise the security bar on the attackers and swing the game in your favor.
—Michael Howard, Principal Cyber Security Program Manager, Microsoft
As a penetration tester, my job will be a lot harder as people read this book!
—Kevin Johnson, Security Consultant, Secure Ideas
At 130 pages, the book quickly focuses on the core points of the issue. Paul writes in an easy to read and understand style. With the use of various stories and examples; the need for secure software development is undeniable. ... The 7 Qualities of Highly Secure Software highlights the qualities that are essential and critical to stop insecure code. This is a highly valuable book that can be of significant use to every stakeholder—from those in the boardroom to the developers and head of application development. Ultimately, this is a book you want all of your software developers to read.
—Ben Rothke, CISSP, CISA, Information Security Manager, Wyndham Worldwide
Notă biografică
Manoranjan (Mano) Paul is the Software Assurance Advisor for (ISC)2, the global leader in information security education and certification, representing and advising the organization on software assurance strategy, training, education, and certification. He is also a member of the Application Security Advisory Board. He is the winner of the first Information Security Leadership Awards (ISLA) as a practitioner in the Americas region. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education.
Paul started his career as a shark researcher in the Bimini Biological Field Station, Bahamas. His educational pursuit took him to the University of Oklahoma where he received his Business Administration degree in Management Information Systems (MIS) with various accolades and the coveted 4.0 GPA. Following his entrepreneurial acumen, he founded and serves as the CEO and President of Express Certifications, a professional certification assessment and training company that developed studISCope, (ISC)2’s official self-assessment offering for their certifications. Express Certifications is also the self-assessment testing company behind the US Department of Defense certification education program as mandated by the 8570.1 directive. He also founded SecuRisk Solutions, a company that specializes in security product development and consulting. Before Express Certifications and SecuRisk Solutions, Paul played several roles from software developer, quality assurance engineer, logistics manager, technical architect, IT strategist, and security engineer/program manager/strategist at Dell, Inc.
Paul is the author of the Official Guide to the CSSLP (Certified Secure Software Lifecycle Professional) and is a contributing author to the Information Security Management Handbook, and has contributed to several security topics for the Microsoft Solutions Developer Network (MSDN). He has served as Vice-President, industry representative, and an appointed faculty member of the Capitol of Texas Information System Security Association (ISSA) chapter and vice president of the cloud Security Alliance (CSA), Austin chapter. He has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering talks, training, and keynotes at conferences such as the SANS, OWASP, ASIS, CSI, Gartner Catalyst, and SC World Congress. Paul holds the following professional certifications: CSSLP, CISSP, AMBCI, MCSD, MCAD, CompTIA Network+, and ECSA certification.
Paul started his career as a shark researcher in the Bimini Biological Field Station, Bahamas. His educational pursuit took him to the University of Oklahoma where he received his Business Administration degree in Management Information Systems (MIS) with various accolades and the coveted 4.0 GPA. Following his entrepreneurial acumen, he founded and serves as the CEO and President of Express Certifications, a professional certification assessment and training company that developed studISCope, (ISC)2’s official self-assessment offering for their certifications. Express Certifications is also the self-assessment testing company behind the US Department of Defense certification education program as mandated by the 8570.1 directive. He also founded SecuRisk Solutions, a company that specializes in security product development and consulting. Before Express Certifications and SecuRisk Solutions, Paul played several roles from software developer, quality assurance engineer, logistics manager, technical architect, IT strategist, and security engineer/program manager/strategist at Dell, Inc.
Paul is the author of the Official Guide to the CSSLP (Certified Secure Software Lifecycle Professional) and is a contributing author to the Information Security Management Handbook, and has contributed to several security topics for the Microsoft Solutions Developer Network (MSDN). He has served as Vice-President, industry representative, and an appointed faculty member of the Capitol of Texas Information System Security Association (ISSA) chapter and vice president of the cloud Security Alliance (CSA), Austin chapter. He has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering talks, training, and keynotes at conferences such as the SANS, OWASP, ASIS, CSI, Gartner Catalyst, and SC World Congress. Paul holds the following professional certifications: CSSLP, CISSP, AMBCI, MCSD, MCAD, CompTIA Network+, and ECSA certification.
Descriere
Providing a framework for designing, developing, and deploying hack-resilient software, this book uses engaging anecdotes and analogies—from Aesop’s fables and athletics to architecture and video games—to illustrate the qualities needed for the development of highly secure software. Each chapter details one of the seven qualities that make software less susceptible to hacker threats. Filled with real-world examples, the book explains complex security concepts in language that’s easy to understand to supply readers with the understanding needed to building secure software.