Logo

The Developer Highway Code by Paul Maher, Alex Mackman

Large book cover: The Developer Highway Code

The Developer Highway Code
by

Publisher: Microsoft Press
ISBN/ASIN: 1905707584
ISBN-13: 9781905707584
Number of pages: 163

Description:
To build software that meets your security objectives, you must integrate security activities into your software development lifecycle. This handbook captures and summarises the key security engineering activities that should be an integral part of your software development processes. These security engineering activities have been developed by Microsoft patterns & practices to build on, refine and extend core lifecycle activities with a set of security-specific activities. These include identifying security objectives, applying design guidelines for security, threat modelling, security architecture and design reviews, security code reviews and security deployment reviews.

Download or read it online for free here:
Download link
(6.6MB, PDF)

Similar books

Book cover: Security and Privacy in Wireless and Mobile NetworksSecurity and Privacy in Wireless and Mobile Networks
by - MDPI AG
Dedicated to the security and privacy aspects of mobile networks, wireless communications, and their apps. The focus is on the security and privacy of mobile software platforms and the increasingly differing spectrum of mobile or wireless apps.
(7271 views)
Book cover: The Open-source PKI BookThe Open-source PKI Book
by - OpenCA Team
This document describes Public Key Infrastructures, the PKIX standards, practical PKI functionality and gives an overview of available open-source PKI implementations. Its aim is foster the creation of viable open-source PKI implementations.
(10272 views)
Book cover: Security ConceptsSecurity Concepts
by - subspacefield.org
This is an online book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting examples. It is not intended to be an introductory text, although a beginner could gain something from it.
(11710 views)
Book cover: Markets for Cybercrime Tools and Stolen Data: Hackers' BazaarMarkets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
by - RAND Corporation
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report describes the fundamental characteristics of these markets.
(7724 views)