|En la categoría:
¿Quieres vender uno?

Security-Driven Software Development: Learn to analyze and mitigate risks in you

grandeagleretail
(947880)
Registrado como vendedor profesional
USD60,80
Aproximadamente52,04 EUR
Estado:
Nuevo
3 disponibles
Respira tranquilidad. Se aceptan devoluciones.
Envío:
Gratis Economy Shipping.
Ubicado en: Fairfield, Ohio, Estados Unidos
Entrega:
Entrega prevista entre el mié. 10 sep. y el mar. 16 sep. a 94104
Calculamos el plazo de entrega con un método patentado que combina diversos factores, como la proximidad del comprador a la ubicación del artículo, el servicio de envío seleccionado, el historial de envíos del vendedor y otros datos. Los plazos de entrega pueden variar, especialmente en épocas de mucha actividad.
Devoluciones:
30 días para devoluciones. El comprador paga el envío de la devolución..
Pagos:
    Diners Club

Compra con confianza

Garantía al cliente de eBay
Si no recibes el artículo que has pedido, te devolvemos el dinero. Más informaciónGarantía al cliente de eBay - se abre en una nueva ventana o pestaña
El vendedor asume toda la responsabilidad de este anuncio.
N.º de artículo de eBay:396908873390

Características del artículo

Estado
Nuevo: Libro nuevo, sin usar y sin leer, que está en perfecto estado; incluye todas las páginas sin ...
ISBN-13
9781835462836
Book Title
Security-Driven Software Development
ISBN
9781835462836

Acerca de este producto

Product Identifiers

Publisher
Packt Publishing, The Limited
ISBN-10
1835462839
ISBN-13
9781835462836
eBay Product ID (ePID)
2336891328

Product Key Features

Language
English
Publication Name
Security-Driven Software Development : Learn to Analyze and Mitigate Risks in Your Software Projects
Publication Year
2024
Subject
Security / Networking
Type
Textbook
Author
Aspen Olmsted
Subject Area
Computers
Format
Trade Paperback

Dimensions

Item Length
92.5 in
Item Width
75 in

Additional Product Features

Intended Audience
Trade
Synopsis
Trace security requirements through each development phase, mitigating multiple-layer attacks with practical examples, and emerge equipped with the skills to build resilient applications Key Features Explore the practical application of secure software development methodologies Model security vulnerabilities throughout the software development lifecycle (SDLC) Develop the skills to trace requirements, from requirements gathering through to implementation Purchase of the print or Kindle book includes a free PDF eBook Book Description Extend your software development skills to integrate security into every aspect of your projects. Perfect for any programmer or developer working on mission-critical applications, this hands-on guide helps you adopt secure software development practices. Explore core concepts like security specifi cation, modeling, and threat mitigation with the iterative approach of this book that allows you to trace security requirements through each phase of software development. You won't stop at the basics; you'll delve into multiple-layer att acks and develop the mindset to prevent them. Through an example application project involving an entertainment ticketing software system, you'll look at high-profi le security incidents that have aff ected popular music stars and performers. Drawing from the author's decades of experience building secure applications in this domain, this book off ers comprehensive techniques where problem-solving meets practicality for secure development. By the end of this book, you'll have gained the expertise to systematically secure software projects, from crafting robust security specifi cations to adeptly mitigating multifaceted threats, ensuring your applications stand resilient in the face of evolving cybersecurity challenges. What you will learn Find out non-functional requirements crucial for software security, performance, and reliability Develop the skills to identify and model vulnerabilities in software design and analysis Analyze and model various threat vectors that pose risks to software applications Acquire strategies to mitigate security threats specific to web applications Address threats to the database layer of an application Trace non-functional requirements through secure software design Who this book is for Many software development jobs require developing, maintaining, enhancing, administering, and defending software applications, websites, and scripts. This book is designed for software developers and web developers seeking to excel in these roles, offering concise explanations and applied example use-cases. Table of Contents Security Principles Designing a Secure Functional Model Designing a Secure Object Model Designing a Secure Dynamic Model Designing a Secure System Model Threat Modeling Authentication and Authorization Input Validation and Sanitization Standard Web Application Vulnerabilities Database Security Unit Testing Regression Testing Integration, System, and Acceptance Testing Software Penetration Testing, Trace security requirements through each development phase, mitigating multiple-layer attacks with practical examples, and emerge equipped with the skills to build resilient applications Key Features Explore the practical application of secure software development methodologies Model security vulnerabilities throughout the software development lifecycle (SDLC) Develop the skills to trace requirements, from requirements gathering through to implementation Purchase of the print or Kindle book includes a free PDF eBook Book Description Extend your software development skills to integrate security into every aspect of your projects. Perfect for any programmer or developer working on mission-critical applications, this hands-on guide helps you adopt secure software development practices. Explore core concepts like security specifi cation, modeling, and threat mitigation with the iterative approach of this book that allows you to trace security requirements through each phase of software development. You won't stop at the basics; you'll delve into multiple-layer att acks and develop the mindset to prevent them. Through an example application project involving an entertainment ticketing software system, you'll look at high-profi le security incidents that have aff ected popular music stars and performers. Drawing from the author's decades of experience building secure applications in this domain, this book off ers comprehensive techniques where problem-solving meets practicality for secure development.By the end of this book, you'll have gained the expertise to systematically secure software projects, from crafting robust security specifi cations to adeptly mitigating multifaceted threats, ensuring your applications stand resilient in the face of evolving cybersecurity challenges. What you will learn Find out non-functional requirements crucial for software security, performance, and reliability Develop the skills to identify and model vulnerabilities in software design and analysis Analyze and model various threat vectors that pose risks to software applications Acquire strategies to mitigate security threats specific to web applications Address threats to the database layer of an application Trace non-functional requirements through secure software design Who this book is for Many software development jobs require developing, maintaining, enhancing, administering, and defending software applications, websites, and scripts. This book is designed for software developers and web developers seeking to excel in these roles, offering concise explanations and applied example use-cases. ]]>

Descripción del artículo del vendedor

Información de vendedor profesional

Certifico que todas mis actividades de venta cumplirán todas las leyes y reglamentos de la UE.
Acerca de este vendedor

grandeagleretail

98,2% de votos positivos2,8 millones artículos vendidos

Se unió el sep 2010
Suele responder en 24 horas
Registrado como vendedor profesional
Grand Eagle Retail is your online bookstore. We offer Great books, Great prices and Great service.
Visitar tiendaContactar

Valoraciones detalladas sobre el vendedor

Promedio durante los últimos 12 meses
Descripción precisa
4.9
Gastos de envío razonables
5.0
Rapidez de envío
5.0
Comunicación
4.9

Votos de vendedor (1.056.384)

Todas las valoraciones
Positivas
Neutras
Negativas
  • c***a (121)- Votos emitidos por el comprador.
    Mes pasado
    Compra verificada
    The seller was very responsive and answered me on a timely matter. The product itself came in its packaging and was new, not used at all. The packaging was not beat up or anything, safely delivered to my mailbox. No mix ups and zero stress with delivery. The price for the product is completely understandable for the product. I really appreciate the seller and I am very happy to have purchased through this seller. Completely trustable!
  • m***4 (1604)- Votos emitidos por el comprador.
    Mes pasado
    Compra verificada
    Leaving positive feedback because 1) item was packed well & arrived as described 2) seller did give partial refund when subsequent price dropped below org purchase price. 3) communication was quick However, there was a downside to this transaction -item listed as in-stock but ended up waiting nearly a month for them to get it from their distributer then ship it to me (bought June 29th, arrived around July 21). Auction said 12-15 days. Better clarity would have prevented lot of frustration
  • w***i (875)- Votos emitidos por el comprador.
    Últimos 6 meses
    Compra verificada
    Absolutely Wonderful Seller!! Terrific Item As Described!!! Great Service and Communication!! Shipped In Waterproof Packaging!! I Received Item In About One Week!! Very Pleased With Seller! I Will Buy From This Seller Again!!