|
![]() |
|||
|
||||
OverviewThis book sets out to equip agile software development teams and security stakeholders with the tools needed to harden a software product. This is done by fusing the processes of agile software development with the top twenty-five software security bugs widely known to developers and security experts. Building security in and making it an integral part of the software development life cycle is very much a challenge for any software and product development team. This book shows agile teams how the barriers to security can be broken down to build security in to existing or new software products.This book will take agile teams through the process of building security into a software product. Traditional agile team roles are given new, additional security roles and responsibilities; agile will support the flexibility needed for these additional roles. The worksheets and tables provided at the end of this book serve to support scrum masters and product owners as they transition to the new, added responsibility in their organization. Full Product DetailsAuthor: Stephen M DyePublisher: Createspace Independent Publishing Platform Imprint: Createspace Independent Publishing Platform Dimensions: Width: 21.60cm , Height: 0.40cm , Length: 27.90cm Weight: 0.209kg ISBN: 9781532926914ISBN 10: 153292691 Pages: 58 Publication Date: 09 May 2016 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: Available To Order ![]() We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsReviewsAuthor InformationStephen M Dye is a software security professional who helps companies build secure software. Stephen applies multiple techniques such as threat modeling, secure code reviews, architectural analysis and the built-in security measures featured in this book to enable a client's success. Stephen is also a mobility subject matter expert with experience in mobile devices, apps, Mobile Device Managers and Mobile App Managers. Stephen has authored several other books on GPS, Machine to Machine (M2M) and Wireless Instant Messaging. Stephen earned his Bachelor's Degree in Electrical and Electronic Engineering from Bromley College of Technology in Kent, England in 1987, is C-EH, CompTIA Security], ITIL V3, IC Agile and Scrum Master certified. Stephen also achieved the Honor Code Certificate for Cyber Security Technology, Application and Policy from the Massachusetts Institute of Technology. Tab Content 6Author Website:Countries AvailableAll regions |