|
|
libcats.org
Architecting Secure Software SystemsAsoke K. Talukder, Manish ChaitanyaTraditionally, software engineers have defined security as a non-functional requirement. As such, all too often it is only considered as an afterthought, making software applications and services vulnerable to attacks. With the phenomenal growth in cybercrime, it has become imperative that security be an integral part of software engineering so that all software assets are protected and safe. Architecting Secure Software Systems defines how security should be incorporated into basic software engineering at the requirement analysis phase, continuing this sharp focus into security design, secured programming, security testing, and secured deployment. Outlines Protection Protocols for Numerous Applications Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments. Finally, they explore the security of telecommunications and other distributed services through Service Oriented Architecture (SOA). The book employs a versatile multi-platform approach that allows users to seamlessly integrate the material into their own programming paradigm regardless of their individual programming backgrounds. The text also provides real-world code snippets for experimentation. Define a Security Methodology from the Initial Phase of Development
Almost all assets in our lives have a virtual presence and the convergence of computer information and telecommunications makes these assets accessible to everyone in the world. This volume enables developers, engineers, and architects to approach security in a holistic fashion at the beginning of the software development lifecycle. By securing these systems from the project’s inception, the monetary and personal privacy catastrophes caused by weak systems can potentially be avoided.
EPUB | FB2 | MOBI | TXT | RTF
* Конвертация файла может нарушить форматирование оригинала. По-возможности скачивайте файл в оригинальном формате.
Популярные книги за неделю:
Проектирование и строительство. Дом, квартира, садАвтор: Петер Нойферт, Автор: Людвиг Нефф
Размер книги: 20.83 Mb
Система упражнений по развитию способностей человека (Практическое пособие)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 818 Kb
Сотворение мира (3-х томник)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 817 Kb
Радиолюбительские схемы на ИС типа 555Автор: Трейстер Р.Категория: Электротехника и связь
Размер книги: 13.64 Mb
Только что пользователи скачали эти книги:
Финитно аппроксимируемые группы с нетривиальными пересечениями пар подгруппАвтор: Созутов А.И.
Размер книги: 324 Kb
IT Auditing Using Controls to Protect Information Assets, 2nd EditionАвтор: Chris Davis, Автор: Mike Schiller, Автор: Kevin Wheeler
Размер книги: 7.75 Mb
El Poder De Las Redes Manual ilustrado para personas, colectivos y empresas abocados al ciberactivismo.Автор: David de Ugarte
Размер книги: 1.09 Mb
The Trials of Life: A Natural History of Animal BehaviorАвтор: David AttenboroughКатегория: История
Размер книги: 8.45 Mb
Korea in the Cross Currents: A Century of Struggle and the Crisis of ReunificationАвтор: Robert J. Myers
Размер книги: 636 Kb
Экология : учеб. для студентов вузов, обучающихся по техн. специальностямАвтор: [В. Н. Большаков и др.]; под ред. Г. В. Тягунова и Ю. Г. Ярошенко;Большаков, Автор: Владимир Николаевич; Тягунов, Автор: Геннадий Васильевич;ред.
Размер книги: 4.91 Mb
|
|
|