Литмир - Электронная Библиотека
Enterprise Software Security
Добавить похожую книгу
Bells of Scotland Road
Автор: Hamilton Ruth (EN)
Похожа
Непохожа
Getting the Gold
Автор: Barry P.J. (EN)
Похожа
Непохожа
Sunny's Kitchen
Похожа
Непохожа
Enterprise Software Security
Author:Wyk Kenneth R. van (EN)
Language of a book: Английский
Language of an original book: Английский
Publisher: Gardners Books

    STRENGTHEN SOFTWARE SECURITY BY HELPING DEVELOPERS AND SECURITY EXPERTS WORK TOGETHER Traditional approaches to securing software are inadequate. The solution: Bring software engineering and network security teams together in a new, holistic approach to protecting the entire enterprise. Now, four highly respected security experts explain why this ';confluence' is so crucial, and show how to implement it in your organization. Writing for all software and security practitioners and leaders, they show how software can play a vital, active role in protecting your organization. You'll learn how to construct software that actively safeguards sensitive data and business processes and contributes to intrusion detection/response in sophisticated new ways. The authors cover the entire development lifecycle, including project inception, design, implementation, testing, deployment, operation, and maintenance. They also provide a full chapter of advice specifically for Chief Information Security Officers and other enterprise security executives. Whatever your software security responsibilities, Enterprise Software Security delivers indispensable big-picture guidanceand specific, high-value recommendations you can apply right now. COVERAGE INCLUDES: *; Overcoming common obstacles to collaboration between developers and IT security professionals*; Helping programmers design, write, deploy, and operate more secure software*; Helping network security engineers use application output more effectively*; Organizing a software security team before you've even created requirements*; Avoiding the unmanageable complexity and inherent flaws of layered security*; Implementing positive software design practices and identifying security defects in existing designs*; Teaming to improve code reviews, clarify attack scenarios associated with vulnerable code, and validate positive compliance*; Moving beyond pentesting toward more comprehensive security testing*; Integrating your new application with your existing security infrastructure*; ';Ruggedizing' DevOps by adding infosec to the relationship between development and operations*; Protecting application security during maintenance

    Поделиться:
    ]]>Facebook :0]]>  ]]>Twitter :0]]>  ]]>В контакте :1]]>  ]]>Livejournal :0]]>  ]]>Мой мир :0]]>  ]]>Gmail :0]]>  Email :0  ]]>Скачать :0]]>  
    Мой статус книги:
    Чтобы оставить свою оценку и комментарий вам нужно зайти на сайт или зарегистрироваться

    {"b":"362279","o":30}