Experal logo
Core Software Security - Security at the Source — image 1
Computers & Technology

Core Software Security - Security at the Source

Sold byBooks for Life

SKU: 9784296236589

$168.00
Only 10 left in stock
1

Description

"... an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. ... Readers are armed with firm solutions for the fight against cyber threats."—Dr. Dena Haritos Tsamitis. Carnegie Mellon University"... a must read for security specialists, software developers and software engineers. ... should be part of every security professional’s library." —Dr. Larry Ponemon, Ponemon Institute"... the definitive how-to guide for software security professionals. Dr. Ransome, Anmol Misra, and Brook Schoenfield deftly outline the procedures and policies needed to integrate real security into the software development process. ...A must-have for anyone on the front lines of the Cyber War ..." —Cedric Leighton, Colonel, USAF (Ret.), Cedric Leighton Associates"Dr. Ransome, Anmol Misra, and Brook Schoenfield give you a magic formula in this book - the methodology and process to build security into the entire software development life cycle so that the software is secured at the source! "—Eric S. Yuan, Zoom Video CommunicationsThere is much publicity regarding network security, but the real cyber Achilles’ heel is insecure software. Millions of software vulnerabilities create a cyber house of cards, in which we conduct our digital lives. In response, security people build ever more elaborate cyber fortresses to protect this vulnerable software. Despite their efforts, cyber fortifications consistently fail to protect our digital treasures. Why? The security industry has failed to engage fully with the creative, innovative people who write software.Core Software Security expounds developer-centric software security, a holistic process to engage creativity for security. As long as software is developed by humans, it requires the human element to fix it. Developer-centric security is not only feasible but also cost effective and operationally relevant. The methodology builds security into software development, which lies at the heart of our cyber infrastructure. Whatever development method is employed, software must be secured at the source. Book Highlights: Supplies a practitioner's view of the SDL Considers Agile as a security enablerCovers the privacy elements in an SDLOutlines a holistic business-savvy SDL framework that includes people, process, and technologyHighlights the key success factors, deliverables, and metrics for each phase of the SDLExamines cost efficiencies, optimized performance, and organizational structure of a developer-centric software security program and PSIRTIncludes a chapter by noted security architect Brook Schoenfield who shares his insights and experiences in applying the book’s SDL framework View the authors' website at http://www.androidinsecurity.com/Table of ContentIntroduction. The Secure Development Lifecycle. Security Assessment (A1): SDL Activities and Best Practices. Architecture (A2): SDL Activities and Best Practices. Design and Development (A3): SDL Activities and Best Practices. Design and Development (A4): SDL Activities and Best Practices. Ship (A5): SDL Activities and Best Practices. Post-Release Support (PRSA1–5). Applying the SDL Framework to the Real World. Pulling It All Together: Using the SDL to Prevent Real-World Threats.Review QuoteFirst and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.—Dr. Dena Haritos Tsamitis, Director, Information Networking Institute and Director of Education, CyLab Carnegie Mellon UniversityFinally, the definitive how-to guide for software security professionals. Dr. Ransome, Anmol Misra, and Brook Schoenfield deftly outline the procedures and policies needed to integrate real security into the software development process and why security needs to be software and developer-centric if it is to be relevant. A must-have for anyone on the front lines of the Cyber War - especially software developers and those who work with them.—Cedric Leighton, Colonel, USAF (Ret); Founder & President, Cedric Leighton AssociatesIn the wake of cloud computing and mobile apps, the issue of software security has never been more important than today. This book is a must read for security specialists, software developers and software engineers. The authors do a brilliant job providing common sense approaches to achieving a strong software security posture.—Dr. Larry Ponemon, Chairman & Founder, Ponemon InstituteThe root of software security lies within the source code developed by software developers. Therefore, security should be developer-centric, focused on the secure development of the source code. Dr. Ransome, Anmol Misra, and Brook Schoenfield give you a magic formula in this book - the methodology and process to build security into the entire software development life cycle so that the software is secured at the source!—Eric S. Yuan, Founder and CEO, Zoom Video Communications, IncMisra and his co-author James Ransome, senior director of product security at McAfee, an Intel Company, reflected on years of lessons learned and experiences with Fortune 500 clients and devised a methodology that builds security into software development. The newly published book Core Software Security, Security at the Source takes an innovative approach that engages the creativity of the developer. ... The book covers embedding security as a part of existing software development methods, and how security can be a business enabler and a competitive differentiator. Throughout the book, the authors describe a modern, holistic framework for software security that includes people, process and technology. The book includes metrics, cost effectiveness, case studies, threat modeling and considerations for mobile software and privacy.—Sherry Stokes, writing in Carnegie Mellon News, May 2014Review QuoteFirst and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.—Dr. Dena Haritos Tsamitis, Director, Information Networking Institute and Director of Education, CyLab Carnegie Mellon UniversityFinally, the definitive how-to guide for software security professionals. Dr. Ransome, Anmol Misra, and Brook Schoenfield deftly outline the procedures and policies needed to integrate real security into the software development process and why security needs to be software and developer-centric if it is to be relevant. A must-have for anyone on the front lines of the Cyber War - especially software developers and those who work with them.—Cedric Leighton, Colonel, USAF (Ret); Founder & President, Cedric Leighton AssociatesIn the wake of cloud computing and mobile apps, the issue of software security has never been more important than today. This book is a must read for security specialists, software developers and software engineers. The authors do a brilliant job providing common sense approaches to achieving a strong software security posture.—Dr. Larry Ponemon, Chairman & Founder, Ponemon InstituteThe root of software security lies within the source code developed by software developers. Therefore, security should be developer-centric, focused on the secure development of the source code. Dr. Ransome, Anmol Misra, and Brook Schoenfield give you a magic formula in this book - the methodology and process to build security into the entire software development life cycle so that the software is secured at the source!—Eric S. Yuan, Founder and CEO, Zoom Video Communications, IncMisra and his co-author James Ransome, senior director of product security at McAfee, an Intel Company, reflected on years of lessons learned and experiences with Fortune 500 clients and devised a methodology that builds security into software development. The newly published book Core Software Security, Security at the Source takes an innovative approach that engages the creativity of the developer. ... The book covers embedding security as a part of existing software development methods, and how security can be a business enabler and a competitive differentiator. Throughout the book, the authors describe a modern, holistic framework for software security that includes people, process and technology. The book includes metrics, cost effectiveness, case studies, threat modeling and considerations for mobile software and privacy.—Sherry Stokes, writing in Carnegie Mellon News, May 2014Biographical NoteDr. James Ransome is the Senior Director of Product Security and responsible for all aspects of McAfee’s Product Security Program, a corporate-wide initiative that supports McAfee’s business units in delivering best-in-class, secure software products to customers. In this role, James sets program strategy, manages security engagements with McAfee business units, maintains key relationships with McAfee product engineers, and works with other leaders to help define and build product security capabilities. His career has been marked by leadership positions in private and public industries, including three chief information security officer (CISO) and four chief security officer (CSO) roles. Prior to entering the corporate world, James had 23 years of government service in various roles supporting the U.S. intelligence community, federal law enforcement, and the Department of Defense.James holds a Ph.D. in Informa

Specifications

ISBN-13
9784296236589
Author
Anmol Misra
Publisher
Taylor & Francis Ltd
Publication Date
2013-12-09
Binding
hardcover
Condition
new
Pages
414
Language
english
Country of Origin
United States
Weight (g)
771
Height (mm)
30
Length (mm)
234
Width (mm)
156
MRRP
120.00 GBP

Frequently Asked Questions

Standard shipping to United States typically takes 3–7 business days after dispatch. Express options are available at checkout.

We offer a 30-day return window for most products. Items must be unused, in their original packaging, and accompanied by proof of purchase to qualify for a full refund.

We accept all major credit and debit cards (Visa, Mastercard, American Express), as well as Apple Pay and Google Pay. All transactions are processed securely via Stripe and charged in USD.

Yes — we never store your card details. All payments are handled by Stripe, a PCI-DSS Level 1 certified payment processor, using industry-standard TLS encryption.

Some products can be backordered — you will see a note on the product page if this is the case. We will ship as soon as stock arrives and keep you updated via email.

Once your order is dispatched you will receive a shipping confirmation email containing your tracking number and a link to track your parcel in real time.

Customer Reviews

More in Computers & Technology

See all →

More from Books for Life

See all →