Logo

The Developer Highway Code by Paul Maher, Alex Mackman

Large book cover: The Developer Highway Code

The Developer Highway Code
by

Publisher: Microsoft Press
ISBN/ASIN: 1905707584
ISBN-13: 9781905707584
Number of pages: 163

Description:
To build software that meets your security objectives, you must integrate security activities into your software development lifecycle. This handbook captures and summarises the key security engineering activities that should be an integral part of your software development processes. These security engineering activities have been developed by Microsoft patterns & practices to build on, refine and extend core lifecycle activities with a set of security-specific activities. These include identifying security objectives, applying design guidelines for security, threat modelling, security architecture and design reviews, security code reviews and security deployment reviews.

Download or read it online for free here:
Download link
(6.6MB, PDF)

Similar books

Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(11683 views)
Book cover: IT Security CookbookIT Security Cookbook
by - Boran Consulting
This document defines a security policy, outlines structure of a security organization, presents current security mechanisms, and provides technical guidelines for operating systems, applications and networks used in client/server systems.
(10847 views)
Book cover: Forensic Analysis of Database TamperingForensic Analysis of Database Tampering
by - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(14240 views)
Book cover: Security Enhanced Applications for Information SystemsSecurity Enhanced Applications for Information Systems
by - InTech
Designing and implementing security enhanced systems is of vital importance. This book aims to present a number of innovative security enhanced applications. It involves cases based on the standalone, network and Cloud environments.
(5380 views)