logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Secure and Resilient Software : Requirements, Test Cases, and Testing Methods

Secure and Resilient Software : Requirements, Test Cases, and Testing Methods (Hardcover)

Mark S. Merkow (지은이)
Auerbach Publications
185,620원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
152,200원 -18% 0원
7,610원
144,590원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Secure and Resilient Software : Requirements, Test Cases, and Testing Methods
eBook 미리보기

책 정보

· 제목 : Secure and Resilient Software : Requirements, Test Cases, and Testing Methods (Hardcover) 
· 분류 : 외국도서 > 컴퓨터 > 프로그래밍 언어 > 일반
· ISBN : 9781439866214
· 쪽수 : 278쪽
· 출판일 : 2011-11-10

목차

Introduction
Secure and Resilient
Bad Design Choices Led to the Vulnerable Internet We Know Today
HTTP Has Its Problems, Too
Design Errors Continue Haunting Us Today
Requirements & Design: The Keys to a Successful Software Project
How Design Flaws Play Out
     DNS Vulnerability 
     The London Stock Exchange 
     Medical Equipment
     Airbus A380
Solutions Are In Sight!
Notes

Nonfunctional Requirements (NFRs) in Context
System Quality Requirements Engineering (SQUARE) 
     Agree on Definitions 
     Identify Assets and Security/Quality Goals 
     Perform Risk Assessments 
     Elicit Security Requirements 
     Prioritize Requirements
Characteristics of Good Requirements
Summary
Notes

Resilience and Quality Considerations for Application Software and the Application Runtime Environment
Relationships among Nonfunctional Requirements
Considerations for Developing NFRs for your Applications and Runtime Environment
Checking Your Work
Summary
Notes

Security Requirements for Application Software
Security Control Types
Think Like an Attacker
Detailed Security Requirements
Identification Requirements
Authentication Requirements
Authorization Requirements
Security Auditing Requirements
Confidentiality Requirements
Integrity Requirements
Availability Requirements
Nonrepudiation Requirements
Immunity Requirements
Survivability Requirements
Systems Maintenance Security Requirements
Privacy Requirements
Summary
References

Security Services for the Application Operating Environment
The Open Group Architecture Framework (TOGAF)
Standardizing Tools for an Enterprise Architecture
Security Technical Reference Model (TRM) 
     Identification and Authentication 
     System Entry Control
     Audit 
     Access Control 
     Nonrepudiation 
     Security Management 
     Trusted Recovery 
     Encryption
     Trusted Communications
Summary
References

Software Design Considerations for Security and Resilience 
     Design Issues 
     Architecture and Design Considerations 
     Special Security Design Considerations for Payment Applications on Mobile Communications Devices 
     Designing for Integrity
     Architecture and Design Review Checklist 
     Summary 
     References

Best Practices for Converting Requirements to Secure Software Designs
Secure Design Approach
Reusable Security APIs/Libraries
Security Frameworks
Establishing and Following Best Practices for Design
Security Requirements
Security Recommendations
What’s an Attack Surface?
What Is Managed Code?
Understanding Business Requirements for Security Design
Summary
References

Security Test Cases
Standardized Testing Policy
Security Test Cases
     Test Cases for Identification Requirements 
     Test Cases for Authentication Requirements
Test Cases for Authorization Requirements 
     Test Cases for Security Auditing Requirements 
     Test Cases for Confidentiality Requirements
     Test Cases for Integrity Requirements 
     Test Cases for Availability Requirements 
     Test Cases for Nonrepudiation Requirements 
     Test Cases for Immunity Requirements 
     Test Cases for Survivability Requirements 
     Test Cases for Systems Maintenance Security Requirements
Summary

Testing Methods and Best Practices
Secure Testing Approach
OWASP’s Application Security Verification Standard (ASVS) 
     Application Security Verification Levels 
     Level 1?Automated Verification 
     Level 2?Manual Verification 
     Level 3?Design Verification 
     Level 4?Internal Verification
     Security Testing Methods
Manual Source Code Review
Automated Source Code Analysis 
     Automated Reviews Compared with Manual Reviews 
     Automated Source Code Analysis Tools?Deployment Strategy 
     IDE Integration for Developers 
     Build Integration for Governance 
     Automated Dynamic Analysis 
     Limitations of Automated Dynamic Analysis Tools 
     Automated Dynamic Analysis Tools?Deployment Strategy 
     Developer Testing 
     Centralized Quality Assurance Testing
Penetration (Pen) Testing 
     Gray Box Testing
Summary
References

Connecting the Moving Parts
OpenSAMM
Security Requirements 
     Security Requirements: Level 1 
     Security Requirements: Level 2 
     Security Requirements: Level 3
Security Testing 
     Security Testing: Level 1 
     Security Testing: Level 2 
     Security Testing: Level 3
Wrap-Up
References
Index

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책