Logo

The Security Development Lifecycle

Large book cover: The Security Development Lifecycle

The Security Development Lifecycle
by

Publisher: Microsoft Press
ISBN/ASIN: 0735622140
ISBN-13: 9780735622142
Number of pages: 352

Description:
This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs -- the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner guide you through each stage of the SDL -- from education and design to testing and post-release.

Home page url

Download or read it online for free here:
Download link
(multiple formats)

Similar books

Book cover: Security and Privacy for Microsoft Office 2010 UsersSecurity and Privacy for Microsoft Office 2010 Users
by - Microsoft Press
This book is intended as a guide to how to use the powerful security and privacy features of Office 2010 platform effectively. Workers in organizations of all sizes, from small businesses to large enterprises, will benefit from this book.
(10064 views)
Book cover: Cryptography and Data SecurityCryptography and Data Security
by - Addison-Wesley
The book introduces the mathematical principles of data security and shows how these principles apply to operating systems, database systems, and computer networks. It is for students and professionals seeking an introduction to these principles.
(18767 views)
Book cover: The Protection of Information in Computer SystemsThe Protection of Information in Computer Systems
by - MIT
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures that are necessary to support information protection.
(11183 views)
Book cover: Security Enhanced Applications for Information SystemsSecurity Enhanced Applications for Information Systems
by - InTech
Designing and implementing security enhanced systems is of vital importance. This book aims to present a number of innovative security enhanced applications. It involves cases based on the standalone, network and Cloud environments.
(10331 views)