The Developer Highway Code
by Paul Maher, Alex Mackman
Publisher: Microsoft Press 2006
ISBN/ASIN: 1905707584
ISBN-13: 9781905707584
Number of pages: 163
Description:
To build software that meets your security objectives, you must integrate security activities into your software development lifecycle. This handbook captures and summarises the key security engineering activities that should be an integral part of your software development processes. These security engineering activities have been developed by Microsoft patterns & practices to build on, refine and extend core lifecycle activities with a set of security-specific activities. These include identifying security objectives, applying design guidelines for security, threat modelling, security architecture and design reviews, security code reviews and security deployment reviews.
Download or read it online for free here:
Download link
(6.6MB, PDF)
Similar books
The Open-source PKI Bookby Symeon Xenitellis - OpenCA Team
This document describes Public Key Infrastructures, the PKIX standards, practical PKI functionality and gives an overview of available open-source PKI implementations. Its aim is foster the creation of viable open-source PKI implementations.
(12326 views)
Handbook of Information Security Managementby Micki Krause, Harold F. Tipton - Auerbach Publications
This handbook provides dozens of case studies and analyzes showing you exactly how to protect systems and data using the latest tools. Learn how to take the offensive in the battle against information security threats by seeing how the experts do it.
(15694 views)
An Introduction to Computer Security: The NIST Handbookby National Institute of Standards and Technology
The book provides info on securing hardware and software resources of sensitive systems, explains important concepts and interrelationships of security controls. It illustrates the major techniques for each control, and related considerations.
(20951 views)
Policing Cyber Crimeby Petter Gottschalk - BookBoon
From the table of contents: Introduction; Cyber Crime Defined; Cyber Crime Cases; Child Grooming Case; Crime Protection; Corporate Reputation; Knowledge Management; Intelligence Strategy; Crime Investigations; References.
(16109 views)