Logo

The Security Development Lifecycle

Large book cover: The Security Development Lifecycle

The Security Development Lifecycle
by

Publisher: Microsoft Press
ISBN/ASIN: 0735622140
ISBN-13: 9780735622142
Number of pages: 352

Description:
This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs -- the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner guide you through each stage of the SDL -- from education and design to testing and post-release.

Home page url

Download or read it online for free here:
Download link
(multiple formats)

Similar books

Book cover: Policing Cyber CrimePolicing Cyber Crime
by - BookBoon
From the table of contents: Introduction; Cyber Crime Defined; Cyber Crime Cases; Child Grooming Case; Crime Protection; Corporate Reputation; Knowledge Management; Intelligence Strategy; Crime Investigations; References.
(8658 views)
Book cover: An Introduction to Computer Security: The NIST HandbookAn Introduction to Computer Security: The NIST Handbook
by
The book provides info on securing hardware and software resources of sensitive systems, explains important concepts and interrelationships of security controls. It illustrates the major techniques for each control, and related considerations.
(13553 views)
Book cover: Markets for Cybercrime Tools and Stolen Data: Hackers' BazaarMarkets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
by - RAND Corporation
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report describes the fundamental characteristics of these markets.
(2767 views)
Book cover: Rethinking Public Key Infrastructures and Digital CertificatesRethinking Public Key Infrastructures and Digital Certificates
by - The MIT Press
In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens.
(6894 views)