TOP
經典不再等待!讀懂羅馬人的強大,開啟你的智力冒險
The 7 Qualities of Highly Secure Software
滿額折

The 7 Qualities of Highly Secure Software

商品資訊

定價
:NT$ 4029 元
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
無法訂購
商品簡介
作者簡介
目次

商品簡介

The 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies—ranging from Aesop’s fables, athletics, architecture, biology, nursery rhymes, and video games—to illustrate the qualities that are essential for the development of highly secure software.Each chapter details one of the seven qualities that can make your software highly secure and less susceptible to hacker threats. Leveraging real-world experiences and examples, the book:

Explains complex security concepts in language that is easy to understand for professionals involved in management, software development, and operations
Specifies the qualities and skills that are essential for building secure software
Highlights the parallels between the habits of effective people and qualities in terms of software security
Praise for the Book:
This will be required reading for my executives, security team, software architects and lead developers.—David W. Stender, CISSP, CSSLP, CAP, CISO of the US Internal Revenue Service
Developing highly secure software should be at the forefront of organizational strategy and this book provides a framework to do so.—Troy Leach, CTO, PCI Security Standards Council
This book will teach you the core, critical skills needed to raise the security bar on the attackers and swing the game in your favor.—Michael Howard, Principal Cyber Security Program Manager, Microsoft
As a penetration tester, my job will be a lot harder as people read this book! —Kevin Johnson, Security Consultant, Secure Ideas

作者簡介

Manoranjan (Mano) Paul is the Software Assurance Advisor for (ISC)2, the global leader in information security education and certification, representing and advising the organization on software assurance strategy, training, education, and certification. He is also a member of the Application Security Advisory Board. He is the winner of the first Information Security Leadership Awards (ISLA) as a practitioner in the Americas region. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education.

Paul started his career as a shark researcher in the Bimini Biological Field Station, Bahamas. His educational pursuit took him to the University of Oklahoma where he received his Business Administration degree in Management Information Systems (MIS) with various accolades and the coveted 4.0 GPA. Following his entrepreneurial acumen, he founded and serves as the CEO and President of Express Certifications, a professional certification assessment and training company that developed studISCope, (ISC)2’s official self-assessment offering for their certifications. Express Certifications is also the self-assessment testing company behind the US Department of Defense certification education program as mandated by the 8570.1 directive. He also founded SecuRisk Solutions, a company that specializes in security product development and consulting. Before Express Certifications and SecuRisk Solutions, Paul played several roles from software developer, quality assurance engineer, logistics manager, technical architect, IT strategist, and security engineer/program manager/strategist at Dell, Inc.

Paul is the author of the Official Guide to the CSSLP(Certified Secure Software Lifecycle Professional) and is a contributing author to the Information Security Management Handbook, and has contributed to several security topics for the Microsoft Solutions Developer Network (MSDN). He has served as Vice-President, industry representative, and an appointed faculty member of the Capitol of Texas Information System Security Association (ISSA) chapter and vice president of the cloud Security Alliance (CSA), Austin chapter. He has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering talks, training, and keynotes at conferences such as the SANS, OWASP, ASIS, CSI, Gartner Catalyst, and SC World Congress. Paul holds the following professional certifications: CSSLP, CISSP, AMBCI, MCSD, MCAD, CompTIA Network+, and ECSA certification.

目次

Preface

Quality Security Is Built In versus Bolted On (Be Proactive)Prelude: The Ant and the GrasshopperIntroductionSecurity Myths That Need BustingMyth #1: We Have a FirewallMyth #2: We Use SSLMyth #3: We Have Intrusion Detection Systems and Intrusion Prevention Systems (IDSs/IPSs)Myth #4: Our Software Will Not Be Accessible from the InternetMyth #5: We Have Never Been CompromisedMyth #6: Security Is "Not my Job" but the Responsibility of the Service ProviderMyth #7: Security Adds Little to No Value to the BusinessBuild Security In: The Need Build Security In: What It TakesBuild Security In: The Value-AddConclusionReferences

Quality Functionality Maps to a Security Plan(Begin with the End in Mind)Prelude: Breaking the Tape IntroductionWhat Is a Security Plan?Security Plan DevelopmentStep 1: Identify Security ObjectivesStep 2: Identify Applicable RequirementsStep 3: Identify ThreatsStep 4: Identify Applicable ControlsBenefits of a Security PlanMapped SoftwareConclusionReferences

Quality Includes Foundational Assurance Elements (Put First Things First)Prelude: What Lies Beneath?IntroductionData: The New FrontierData Under SiegeThe Foundational Assurance ElementsConfidentialityIntegrityAvailabilityAuthenticationAuthorizationAuditingConclusionReferences

Quality Is Balanced (Think Win-Win)Prelude : The Clown Fish and the AnemoneIntroductionThe Balancing Scale: Risk and RewardThe Balancing Scale: Functionality and AssuranceThe Balancing Scale: Threats and ControlsConclusionReferences

Quality Incorporates Security Requirements(Seek First to Understand, Then to be Understood)Prelude: Lost in TranslationIntroductionTypes of Software Security RequirementsTechniques to Elicit Software Security RequirementsTraceability of Software Security RequirementsRequirements to RetirementConclusionReferences

Quality Is Collaboratively Developed(Synergize)Prelude: There Is No "I" in Team!IntroductionStakeholders in the Game: Whose Perspective?BusinessSecurityManagementDevelopmentLegalPrivacyAuditorsVendorsConclusionReferences

Quality Is Adaptable (Sharpen the Saw)Prelude: The Shark is a PolyphyodontIntroductionThe Law of Resiliency DegradationSoftware Adaptability: Technology, Threats, and TalentTechnologyThreatsTalentBegin with the Future in MindSecure Software Requires Security-SavvyPeopleConclusionReferences
EpilogueQuality Habits
Index

購物須知

外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。

無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。

為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。

若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

定價:100 4029
若需訂購本書,請電洽客服 02-25006600[分機130、131]。

暢銷榜

客服中心

收藏

會員專區