The Developer Highway Code
by Paul Maher, Alex Mackman
Publisher: Microsoft Press 2006
Number of pages: 163
To build software that meets your security objectives, you must integrate security activities into your software development lifecycle. This handbook captures and summarises the key security engineering activities that should be an integral part of your software development processes. These security engineering activities have been developed by Microsoft patterns & practices to build on, refine and extend core lifecycle activities with a set of security-specific activities. These include identifying security objectives, applying design guidelines for security, threat modelling, security architecture and design reviews, security code reviews and security deployment reviews.
Download or read it online for free here:
by Stefan A. Brands - The MIT Press
In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens.
by Dorothy Elizabeth Robling Denning - Addison-Wesley
The book introduces the mathematical principles of data security and shows how these principles apply to operating systems, database systems, and computer networks. It is for students and professionals seeking an introduction to these principles.
by Angsheng Li, Yicheng Pan, Wei Zhang - arXiv
We propose a definition of security and a definition of robustness of networks against the cascading failure models of deliberate attacks and random errors respectively, and investigate the principles of the security and robustness of networks.
by N. Richard Wagner - Univ. of Texas San Antonio
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.