The Developer Highway Code
by Paul Maher, Alex Mackman
Publisher: Microsoft Press 2006
Number of pages: 163
To build software that meets your security objectives, you must integrate security activities into your software development lifecycle. This handbook captures and summarises the key security engineering activities that should be an integral part of your software development processes. These security engineering activities have been developed by Microsoft patterns & practices to build on, refine and extend core lifecycle activities with a set of security-specific activities. These include identifying security objectives, applying design guidelines for security, threat modelling, security architecture and design reviews, security code reviews and security deployment reviews.
Download or read it online for free here:
by Tom Szuba - NCES
This guide has been developed for educational administrators at the building, campus, district, system, and state levels. It will help them better understand how to effectively secure their information, software, computer and networking equipment.
by WeiQi Yan, Jonathan Weir - BookBoon
This introductory text covers media security, highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types. Steganography algorithms are detailed along with detection of information hiding.
by Tarek N. Saadawi, Louis H. Jordan Jr. - Strategic Studies Institute
This book provides an integrated view of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development and an analysis of technology challenges that impede cyber infrastructure protection.
by Travis H. - subspacefield.org
This is an online book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting examples. It is not intended to be an introductory text, although a beginner could gain something from it.