|
|
libcats.org
Architecting Secure Software SystemsAsoke K. Talukder, Manish ChaitanyaTraditionally, software engineers have defined security as a non-functional requirement. As such, all too often it is only considered as an afterthought, making software applications and services vulnerable to attacks. With the phenomenal growth in cybercrime, it has become imperative that security be an integral part of software engineering so that all software assets are protected and safe. Architecting Secure Software Systems defines how security should be incorporated into basic software engineering at the requirement analysis phase, continuing this sharp focus into security design, secured programming, security testing, and secured deployment. Outlines Protection Protocols for Numerous Applications Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments. Finally, they explore the security of telecommunications and other distributed services through Service Oriented Architecture (SOA). The book employs a versatile multi-platform approach that allows users to seamlessly integrate the material into their own programming paradigm regardless of their individual programming backgrounds. The text also provides real-world code snippets for experimentation. Define a Security Methodology from the Initial Phase of Development
Almost all assets in our lives have a virtual presence and the convergence of computer information and telecommunications makes these assets accessible to everyone in the world. This volume enables developers, engineers, and architects to approach security in a holistic fashion at the beginning of the software development lifecycle. By securing these systems from the project’s inception, the monetary and personal privacy catastrophes caused by weak systems can potentially be avoided.
EPUB | FB2 | MOBI | TXT | RTF
* Конвертация файла может нарушить форматирование оригинала. По-возможности скачивайте файл в оригинальном формате.
Популярные книги за неделю:
Проектирование и строительство. Дом, квартира, садАвтор: Петер Нойферт, Автор: Людвиг Нефф
Размер книги: 20.83 Mb
Система упражнений по развитию способностей человека (Практическое пособие)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 818 Kb
Сотворение мира (3-х томник)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 817 Kb
Радиолюбительские схемы на ИС типа 555Автор: Трейстер Р.Категория: Электротехника и связь
Размер книги: 13.64 Mb
Только что пользователи скачали эти книги:
Руководство к практическому применению преобразования ЛапласаАвтор: Деч Г. (Doetsch)
Размер книги: 2.97 Mb
НЛО вокруг насАвтор: Авторы: Владимир Ажажа, Автор: Евгений Крушельницкий.Категория: мистика, аномальные явления
Размер книги: 800 Kb
Хакеры взломщики и другие информационные убийцыАвтор: Борис ЛеонтьевКатегория: Хакерство
Размер книги: 680 Kb
Big Change at Best Buy - Working Through Hypergrowth to Sustained ExcellenceАвтор: Elizabeth Gibson, Автор: Andy Billings
Размер книги: 2.45 Mb
Formal Methods for Open Object-Based Distributed Systems: 8th IFIP WG 6.1 International Conference, FMOODS 2006, Bologna, Italy, June 14-16, 2006,Автор: Roberto Gorrieri, Автор: Heike Wehrheim
Размер книги: 3.98 Mb
Inference And Generalizability in Applied Linguistics: Multiple Perspectives (Language Learning and Language Teaching)Автор: Micheline Chalhoub-Deville, Автор: Carol A. Chapelle, Автор: Patricia DuffКатегория: Языкознание
Размер книги: 1.67 Mb
Embracing the Love God Wants You to Have: A Life of Peace, Joy, and VictoryАвтор: Taffi DollarКатегория: Christian
Размер книги: 279 Kb
|
|
|