Limit this search to....

The 7 Qualities of Highly Secure Software
Contributor(s): Paul, Mano (Author)
ISBN: 1439814465     ISBN-13: 9781439814468
Publisher: Auerbach Publications
OUR PRICE:   $71.20  
Product Type: Hardcover - Other Formats
Published: May 2012
Qty:
Additional Information
BISAC Categories:
- Computers | Security - General
- Computers | Software Development & Engineering - General
- Computers | Information Technology
Dewey: 005.8
Physical Information: 0.6" H x 6.1" W x 9.3" (0.95 lbs) 160 pages
 
Descriptions, Reviews, Etc.
Publisher Description:

The 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies--ranging from Aesop's fables, athletics, architecture, biology, nursery rhymes, and video games--to illustrate the qualities that are essential for the development of highly secure software.

Each chapter details one of the seven qualities that can make your software highly secure and less susceptible to hacker threats. Leveraging real-world experiences and examples, the book:

  • Explains complex security concepts in language that is easy to understand for professionals involved in management, software development, and operations
  • Specifies the qualities and skills that are essential for building secure software
  • Highlights the parallels between the habits of effective people and qualities in terms of software security

Praise for the Book:

This will be required reading for my executives, security team, software architects and lead developers.--David W. Stender, CISSP, CSSLP, CAP, CISO of the US Internal Revenue Service

Developing highly secure software should be at the forefront of organizational strategy and this book provides a framework to do so.--Troy Leach, CTO, PCI Security Standards Council

This book will teach you the core, critical skills needed to raise the security bar on the attackers and swing the game in your favor.--Michael Howard, Principal Cyber Security Program Manager, Microsoft

As a penetration tester, my job will be a lot harder as people read this book! --Kevin Johnson, Security Consultant, Secure Ideas