Secure Software Development - Jason Grembi

Secure Software Development

A Security Programmer's Guide

(Autor)

Buch | Softcover
608 Seiten
2008 | International Edition
Delmar Cengage Learning (Verlag)
978-1-4180-6547-8 (ISBN)
105,95 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Teaches the essentials of developing secure software in accordance with industry standards. This book leads readers through the tasks and activities that computer programmers navigate on a daily basis, from reading and analyzing requirements to choosing development tools, to guarding against software vulnerabilities and attacks.
Learn the essentials of developing secure software in accordance with the most current industry standards, in this comprehensive instructional guide. Secure Software Development: A Programmer's Guide leads readers through the tasks and activities that successful computer programmers navigate on a daily basis, from reading and analyzing requirements to choosing development tools, to guarding against software vulnerabilities and attacks. Additional coverage includes coding with built-in quality and security measures, and follow-up testing once a project is completed. With clear, straightforward examples and actual code snippets, readers can feel confident that they will gain the skills needed to develop software with all the critical components that ensure quality and security.

Jason Grembi is an IT Consultant for Sterling Connect, LLC, and a Sun Certified Java programmer. His consulting business focuses on software development, testing, process assessment/improvement, QA, and specification and design. Grembi has more that 4 years teaching at the university level, 1 year at the community college level, and 10 years of experience in systems and software development.

1 WHY YOU NEED TO LEARN SECURE PROGRAMMING
2 CODING: NOT A SOLITARY PRACTICE
Software Development Lifecycle
Development Team
Watching it Unfold
3 QUALITY AND SECURITY: THE FIRST FOCUS
Code for Quality
Build Security In
4 GOING LIVE: WHAT TO DO ON DAY 1
The Application Guideline
Coming to Terms: Defining Your Conventions
Agree To Disagree
5 SECURITY REQUIREMENTS
Requirement Gathering
Identify Assets
Risk Management
6 COLLABORATING AT THE WHITEBOARD: SECURITY AND QUALITY ARE NO ACCIDENT
Object Modeling
Choose the Language
Design quality code
7 DEVELOPMENT TOOLS: HOW TO CHOOSE WISELY
IDEs tools
Versioning tools
Networking tools
8 CODING IN THE CUBE: LETS GET TO WORK
Functions, procedures, and code blocks
Structuring for Validation
Structured Programming
Debugging
9 TESTING
When your peers are looking
Code Reviews
Testing when everyone is looking
Classification of security defects
Measurement of secure performance
Managing the overall Testing Process
10 AFTER THE GLORY: MAINTAINING IT 9 TO 5
Were scanning for threats
Like networking
Startup maintenance
How to code during maintenance
How to apply security requirements
How to advance in maintenance.
11 THE SECURITY CONSULTING COMPANIES: KNOW WHOS OUT THERE
Lightweight Processes - Apply CLASP to your process
12 THE HORIZON: MAINTAINING YOUR PROFESSION
The impact of outsourcing
How you gain knowledge to secure your position
What you will need to know for the next project
How to be informed

Verlagsort Clifton Park
Sprache englisch
Maße 189 x 234 mm
Gewicht 524 g
Themenwelt Informatik Theorie / Studium Kryptologie
ISBN-10 1-4180-6547-1 / 1418065471
ISBN-13 978-1-4180-6547-8 / 9781418065478
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich