Logo

The Developer Highway Code by Paul Maher, Alex Mackman

Large book cover: The Developer Highway Code

The Developer Highway Code
by

Publisher: Microsoft Press
ISBN/ASIN: 1905707584
ISBN-13: 9781905707584
Number of pages: 163

Description:
To build software that meets your security objectives, you must integrate security activities into your software development lifecycle. This handbook captures and summarises the key security engineering activities that should be an integral part of your software development processes. These security engineering activities have been developed by Microsoft patterns & practices to build on, refine and extend core lifecycle activities with a set of security-specific activities. These include identifying security objectives, applying design guidelines for security, threat modelling, security architecture and design reviews, security code reviews and security deployment reviews.

Download or read it online for free here:
Download link
(6.6MB, PDF)

Similar books

Book cover: Forensic Analysis of Database TamperingForensic Analysis of Database Tampering
by - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(21443 views)
Book cover: Handbook of Information Security ManagementHandbook of Information Security Management
by - Auerbach Publications
This handbook provides dozens of case studies and analyzes showing you exactly how to protect systems and data using the latest tools. Learn how to take the offensive in the battle against information security threats by seeing how the experts do it.
(14192 views)
Book cover: Markets for Cybercrime Tools and Stolen Data: Hackers' BazaarMarkets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
by - RAND Corporation
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report describes the fundamental characteristics of these markets.
(7864 views)
Book cover: The Protection of Information in Computer SystemsThe Protection of Information in Computer Systems
by - MIT
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures that are necessary to support information protection.
(10596 views)