logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Core Software Security : Security at the Source

Core Software Security : Security at the Source (Hardcover)

James Ransome (지은이)
Taylor & Francis
318,500원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
261,170원 -18% 0원
13,060원
248,110원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Core Software Security : Security at the Source
eBook 미리보기

책 정보

· 제목 : Core Software Security : Security at the Source (Hardcover) 
· 분류 : 외국도서 > 컴퓨터 > 소프트웨어 개발/엔지니어링 > 일반
· ISBN : 9781466560956
· 쪽수 : 414쪽
· 출판일 : 2013-12-09

목차

Introduction
The Importance and Relevance of Software Security
Software Security and the Software Development Lifecycle
Quality Versus Secure Code
The Three Most Important SDL Security Goals
Threat Modeling and Attack Surface Validation
Chapter Summary?What to Expect from This Book
References

The Secure Development Lifecycle
Overcoming Challenges in Making Software Secure
Software Security Maturity Models
ISO/IEC 27034?Information Technology?Security Techniques?Application Security
Other Resources for SDL Best Practices
     SAFECode 
     U.S. Department of Homeland Security
Software Assurance Program 
     National Institute of Standards and Technology
     MITRE Corporation Common Computer Vulnerabilities and Exposures
     SANS Institute Top Cyber Security Risks 
     U.S. Department of Defense Cyber Security and Information Systems Information Analysis Center (CSIAC) 
     CERT, Bugtraq, and SecurityFocus
Critical Tools and Talent 
     The Tools
     The Talent
Principles of Least Privilege
Privacy
The Importance of Metrics
Mapping the Security Development Lifecycle to the Software Development Lifecycle
Software Development Methodologies 
     Waterfall Development 
     Agile Development
Chapter Summary
References

Security Assessment (A1): SDL Activities and Best Practices
Software Security Team Is Looped in Early
Software Security Hosts a Discovery Meeting
Software Security Team Creates an SDL Project Plan
Privacy Impact Assessment (PIA) Plan Initiated
Security Assessment (A1) Key Success Factors and Metrics 
     Key Success Factors
     Deliverables 
     Metrics
Chapter Summary
References

Architecture (A2): SDL Activities and Best Practices
A2 Policy Compliance Analysis
SDL Policy Assessment and Scoping
Threat Modeling/Architecture Security Analysis 
     Threat Modeling 
     Data Flow Diagrams 
     Architectural Threat Analysis and Ranking of Threats 
     Risk Mitigation
Open-Source Selection
Privacy Information Gathering and Analysis
Key Success Factors and Metrics 
     Key Success Factors 
     Deliverables 
     Metrics
Chapter Summary
References

Design and Development (A3): SDL Activities and Best Practices
A3 Policy Compliance Analysis
Security Test Plan Composition
Threat Model Updating
Design Security Analysis and Review
Privacy Implementation Assessment
Key Success Factors and Metrics
     Key Success Factors
     Deliverables 
     Metrics
Chapter Summary
References

Design and Development (A4): SDL Activities and Best Practices
A4 Policy Compliance Analysis
Security Test Case Execution
Code Review in the SDLC/SDL Process
Security Analysis Tools 
     Static Analysis
     Dynamic Analysis 
     Fuzz Testing 
     Manual Code Review
Key Success Factors
Deliverables
Metrics
Chapter Summary
References

Ship (A5): SDL Activities and Best Practices
A5 Policy Compliance Analysis
Vulnerability Scan
Penetration Testing
Open-Source Licensing Review
Final Security Review
Final Privacy Review
Key Success Factors
Deliverables
Metrics
Chapter Summary
References

Post-Release Support (PRSA1?5)
Right-Sizing Your Software Security Group 
     The Right Organizational Location 
     The Right People 
     The Right Process
PRSA1: External Vulnerability Disclosure Response
     Post-Release PSIRT Response 
     Post-Release Privacy Response 
     Optimizing Post-Release Third-Party Response
PRSA2: Third-Party Reviews
PRSA3: Post-Release Certifications
PRSA4: Internal Review for New Product Combinations or Cloud Deployments
PRSA5: Security Architectural Reviews and Tool-Based Assessments of Current, Legacy, and M&A Products and Solutions 
     Legacy Code 
     Mergers and Acquisitions (M&As)
Key Success Factors
Deliverables
Metrics
Chapter Summary
References

Applying the SDL Framework to the Real World
Introduction
Build Software Securely 
     Produce Secure Code
     Manual Code Review 
     Static Analysis
Determining the Right Activities for Each Project 
     The Seven Determining Questions
Architecture and Design
Testing 
     Functional Testing 
     Dynamic Testing 
     Attack and Penetration Testing
     Independent Testing
Agile: Sprints
Key Success Factors and Metrics
     Secure Coding Training Program 
     Secure Coding Frameworks (APIs) 
     Manual Code Review 
     Independent Code Review and Testing (by Experts or Third Parties) 
     Static Analysis
     Risk Assessment Methodology 
      Integration of SDL with SDLC 
     Development of Architecture Talent
Metrics
Chapter Summary
References

Pulling It All Together: Using the SDL to Prevent Real-World Threats
Strategic, Tactical, and User-Specific Software Attacks
     Strategic Attacks 
     Tactical Attacks 
     User-Specific Attacks
Overcoming Organizational and Business Challenges with a Properly Designed, Managed, and Focused SDL
Software Security Organizational Realities and Leverage
Overcoming SDL Audit and Regulatory Challenges with Proper Governance Management
Future Predications for Software Security 
     The Bad News 
     The Good News
Conclusion
References

Appendix
Index

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책