|
|
|||
|
||||
OverviewIn this book, Mano Paul takes a Covey-like approach to what is needed to develop and deliver secure software. The author outlines seven specific qualities required of hack-resilient software, which include collaborative development, fundamental necessities, and continuous improvement. He draws parallels between the qualities outlined in Covey's The 7 Habits of Highly Effective People and the seven qualities of secure software. The text provides a clear understanding of security concepts and how they can be applied in building software assurance. Full Product DetailsAuthor: Mano PaulPublisher: Taylor & Francis Inc Imprint: Taylor & Francis Inc Dimensions: Width: 15.60cm , Height: 1.50cm , Length: 23.40cm Weight: 0.408kg ISBN: 9781439814468ISBN 10: 1439814465 Pages: 160 Publication Date: 29 May 2012 Audience: College/higher education , Professional and scholarly , Postgraduate, Research & Scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: In Print This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsQuality 1 - Security is Built In V s. Bolted On (Be Proactive). Quality 2 - Maps to a Plan (Begin with the End in Mind). Quality 3 - Includes Fundamental Necessities (Put First Things First). Quality 4- Is Balanced! (Think Win/Win). Quality 5 - Addresses Requirements (Seek First to Understand, Then to be Understood). Quality 6 - Collaborative Developed (Synergize). Quality 7 - Continuously Improves (Sharpen the Saw).Reviews<p>This will be required reading for my executives, security team, software architects and lead developers.<br> David W. Stender, CISSP, CSSLP, CAP, CISO of the US Internal Revenue Service <p>Developing highly secure software should be at the forefront of organizational strategy and this book provides a framework to do so.<br> Troy Leach, CTO, PCI Security Standards Council <p>This book will teach you the core, critical skills needed to raise the security bar on the attackers and swing the game in your favor.<br> Michael Howard, Principal Cyber Security Program Manager, Microsoft <p>As a penetration tester, my job will be a lot harder as people read this book! <br> Kevin Johnson, Security Consultant, Secure Ideas This will be required reading for my executives, security team, software architects and lead developers. -David W. Stender, CISSP, CSSLP, CAP, CISO of the US Internal Revenue Service Developing highly secure software should be at the forefront of organizational strategy and this book provides a framework to do so. -Troy Leach, CTO, PCI Security Standards Council This book will teach you the core, critical skills needed to raise the security bar on the attackers and swing the game in your favor. -Michael Howard, Principal Cyber Security Program Manager, Microsoft As a penetration tester, my job will be a lot harder as people read this book! -Kevin Johnson, Security Consultant, Secure Ideas This will be required reading for my executives, security team, software architects and lead developers. -David W. Stender, CISSP, CSSLP, CAP, CISO of the US Internal Revenue Service Developing highly secure software should be at the forefront of organizational strategy and this book provides a framework to do so. -Troy Leach, CTO, PCI Security Standards Council This book will teach you the core, critical skills needed to raise the security bar on the attackers and swing the game in your favor. -Michael Howard, Principal Cyber Security Program Manager, Microsoft As a penetration tester, my job will be a lot harder as people read this book! -Kevin Johnson, Security Consultant, Secure Ideas At 130 pages, the book quickly focuses on the core points of the issue. Paul writes in an easy to read and understand style. With the use of various stories and examples; the need for secure software development is undeniable. ... The 7 Qualities of Highly Secure Software highlights the qualities that are essential and critical to stop insecure code. This is a highly valuable book that can be of significant use to every stakeholder-from those in the boardroom to the developers and head of application development. Ultimately, this is a book you want all of your software developers to read. -Ben Rothke, CISSP, CISA, Information Security Manager, Wyndham Worldwide This will be required reading for my executives, security team, software architects and lead developers. --David W. Stender, CISSP, CSSLP, CAP, CISO of the US Internal Revenue Service Developing highly secure software should be at the forefront of organizational strategy and this book provides a framework to do so. --Troy Leach, CTO, PCI Security Standards Council This book will teach you the core, critical skills needed to raise the security bar on the attackers and swing the game in your favor. --Michael Howard, Principal Cyber Security Program Manager, Microsoft As a penetration tester, my job will be a lot harder as people read this book! --Kevin Johnson, Security Consultant, Secure Ideas Author InformationMano Paul is the CEO and President of Express Certifications. Tab Content 6Author Website:Countries AvailableAll regions |
||||