Enterprise Software Security

A Confluence of Disciplines

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Enterprise Software Security by Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley Ph.D., Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley Ph.D. ISBN: 9780321604361
Publisher: Pearson Education Publication: December 1, 2014
Imprint: Addison-Wesley Professional Language: English
Author: Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley Ph.D.
ISBN: 9780321604361
Publisher: Pearson Education
Publication: December 1, 2014
Imprint: Addison-Wesley Professional
Language: English

STRENGTHEN SOFTWARE SECURITY BY HELPING DEVELOPERS AND SECURITY EXPERTS WORK TOGETHER

 

Traditional approaches to securing software are inadequate. The solution: Bring software engineering and network security teams together in a new, holistic approach to protecting the entire enterprise. Now, four highly respected security experts explain why this “confluence” is so crucial, and show how to implement it in your organization.

 

Writing for all software and security practitioners and leaders, they show how software can play a vital, active role in protecting your organization. You’ll learn how to construct software that actively safeguards sensitive data and business processes and contributes to intrusion detection/response in sophisticated new ways. The authors cover the entire development lifecycle, including project inception, design, implementation, testing, deployment, operation, and maintenance. They also provide a full chapter of advice specifically for Chief Information Security Officers and other enterprise security executives.


Whatever your software security responsibilities, Enterprise Software Security delivers indispensable big-picture guidance–and specific, high-value recommendations you can apply right now.

 

COVERAGE INCLUDES:


• Overcoming common obstacles to collaboration between developers and IT security professionals
• Helping programmers design, write, deploy, and operate more secure software
• Helping network security engineers use application output more effectively
• Organizing a software security team before you’ve even created requirements
• Avoiding the unmanageable complexity and inherent flaws of layered security
• Implementing positive software design practices and identifying security defects in existing designs
• Teaming to improve code reviews, clarify attack scenarios associated with vulnerable code, and validate positive compliance
• Moving beyond pentesting toward more comprehensive security testing
• Integrating your new application with your existing security infrastructure
• “Ruggedizing” DevOps by adding infosec to the relationship between development and operations
• Protecting application security during maintenance

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

STRENGTHEN SOFTWARE SECURITY BY HELPING DEVELOPERS AND SECURITY EXPERTS WORK TOGETHER

 

Traditional approaches to securing software are inadequate. The solution: Bring software engineering and network security teams together in a new, holistic approach to protecting the entire enterprise. Now, four highly respected security experts explain why this “confluence” is so crucial, and show how to implement it in your organization.

 

Writing for all software and security practitioners and leaders, they show how software can play a vital, active role in protecting your organization. You’ll learn how to construct software that actively safeguards sensitive data and business processes and contributes to intrusion detection/response in sophisticated new ways. The authors cover the entire development lifecycle, including project inception, design, implementation, testing, deployment, operation, and maintenance. They also provide a full chapter of advice specifically for Chief Information Security Officers and other enterprise security executives.


Whatever your software security responsibilities, Enterprise Software Security delivers indispensable big-picture guidance–and specific, high-value recommendations you can apply right now.

 

COVERAGE INCLUDES:


• Overcoming common obstacles to collaboration between developers and IT security professionals
• Helping programmers design, write, deploy, and operate more secure software
• Helping network security engineers use application output more effectively
• Organizing a software security team before you’ve even created requirements
• Avoiding the unmanageable complexity and inherent flaws of layered security
• Implementing positive software design practices and identifying security defects in existing designs
• Teaming to improve code reviews, clarify attack scenarios associated with vulnerable code, and validate positive compliance
• Moving beyond pentesting toward more comprehensive security testing
• Integrating your new application with your existing security infrastructure
• “Ruggedizing” DevOps by adding infosec to the relationship between development and operations
• Protecting application security during maintenance

More books from Pearson Education

Cover of the book Programming Microsoft Azure Service Fabric by Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley Ph.D.
Cover of the book Some Simple Ideas to Help You Manage Other People by Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley Ph.D.
Cover of the book The Practice of System and Network Administration by Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley Ph.D.
Cover of the book Get Up to Speed with Online Marketing by Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley Ph.D.
Cover of the book QuickBooks 2010 Solutions Guide for Business Owners and Accountants by Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley Ph.D.
Cover of the book Computer Basics Absolute Beginner's Guide, Windows 10 Edition (includes Content Update Program) by Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley Ph.D.
Cover of the book Adobe Photoshop Lightroom 5 by Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley Ph.D.
Cover of the book Multisite Commerce by Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley Ph.D.
Cover of the book Fresher Styles for Web Designers by Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley Ph.D.
Cover of the book Exam Ref 70-346 Managing Office 365 Identities and Requirements by Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley Ph.D.
Cover of the book Alison Balter's Mastering Microsoft Office Access 2007 Development by Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley Ph.D.
Cover of the book The Beermat Entrepreneur by Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley Ph.D.
Cover of the book PHP 5 Advanced by Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley Ph.D.
Cover of the book Microsoft SQL Server 2012 High-Performance T-SQL Using Window Functions by Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley Ph.D.
Cover of the book Advanced Analytics Methodologies by Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley Ph.D.
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy