Logo

The Security Development Lifecycle

Large book cover: The Security Development Lifecycle

The Security Development Lifecycle
by

Publisher: Microsoft Press
ISBN/ASIN: 0735622140
ISBN-13: 9780735622142
Number of pages: 352

Description:
This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs -- the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner guide you through each stage of the SDL -- from education and design to testing and post-release.

Home page url

Download or read it online for free here:
Download link
(multiple formats)

Similar books

Book cover: Forensic Analysis of Database TamperingForensic Analysis of Database Tampering
by - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(14075 views)
Book cover: Security and Privacy for Microsoft Office 2010 UsersSecurity and Privacy for Microsoft Office 2010 Users
by - Microsoft Press
This book is intended as a guide to how to use the powerful security and privacy features of Office 2010 platform effectively. Workers in organizations of all sizes, from small businesses to large enterprises, will benefit from this book.
(4693 views)
Book cover: The Open-source PKI BookThe Open-source PKI Book
by - OpenCA Team
This document describes Public Key Infrastructures, the PKIX standards, practical PKI functionality and gives an overview of available open-source PKI implementations. Its aim is foster the creation of viable open-source PKI implementations.
(5421 views)
Book cover: What If Crime Were Impossible?What If Crime Were Impossible?
by - Univ. of Texas San Antonio
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.
(5596 views)