Logo

The Security Development Lifecycle

Large book cover: The Security Development Lifecycle

The Security Development Lifecycle
by

Publisher: Microsoft Press
ISBN/ASIN: 0735622140
ISBN-13: 9780735622142
Number of pages: 352

Description:
This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs -- the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner guide you through each stage of the SDL -- from education and design to testing and post-release.

Home page url

Download or read it online for free here:
Download link
(multiple formats)

Similar books

Book cover: Software Update as a Mechanism for Resilience and SecuritySoftware Update as a Mechanism for Resilience and Security
- The National Academies Press
Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompasses a wide variety of practices, mechanisms, policies, and technologies.
(5818 views)
Book cover: Security Enhanced Applications for Information SystemsSecurity Enhanced Applications for Information Systems
by - InTech
Designing and implementing security enhanced systems is of vital importance. This book aims to present a number of innovative security enhanced applications. It involves cases based on the standalone, network and Cloud environments.
(9802 views)
Book cover: Good Digital Hygiene: A guide to staying secure in cyberspaceGood Digital Hygiene: A guide to staying secure in cyberspace
by - Bookboon
The explosive growth in the adoption of electronic devices by the general population is creating and environment where some measures of digital hygiene are needed to protect the devices and the data they contain as well as their owners.
(9836 views)
Book cover: Cyber Infrastructure ProtectionCyber Infrastructure Protection
by - Strategic Studies Institute
This book provides an integrated view of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development and an analysis of technology challenges that impede cyber infrastructure protection.
(11405 views)