Cargando…

The security development lifecycle : SDL, a process for developing demonstrably more secure software /

Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs-the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipn...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Howard, Michael, 1965-
Otros Autores: Lipner, Steve
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Redmond, Wash. : Microsoft Press, ©2006.
Colección:Best practices (Redmond, Wash.)
Secure software development series.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocm73814382
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 061020s2006 waua ob 001 0 eng d
010 |a  2006924466 
040 |a UMI  |b eng  |e pn  |c UMI  |d UMI  |d BAKER  |d OCLCG  |d TXJ  |d CEF  |d OCLCQ  |d MKN  |d UAB  |d OCLCE  |d B24X7  |d DEBSZ  |d N$T  |d OCLCQ  |d OCLCO  |d OCLCQ  |d E7B  |d OCLCF  |d OCLCQ  |d OCLCO  |d YDXCP  |d OCLCQ  |d OCLCO  |d ZAD  |d OCLCO  |d OCLCQ  |d OCLCO  |d COO  |d OCLCO  |d OCLCA  |d OCLCQ  |d AU@  |d WYU  |d OCLCQ  |d VT2  |d UK7LJ  |d UKQUB  |d HS0  |d INARC  |d UKAHL  |d OCLCO  |d DST  |d LVT  |d OCLCO  |d OCLCQ 
016 7 |a 2006924466.  |2 Uk 
019 |a 73803756  |a 80850137  |a 606033711  |a 720475661  |a 760806646  |a 777400800  |a 1056413109  |a 1058374443  |a 1060853006  |a 1064068602  |a 1073068415  |a 1083172635  |a 1103263108  |a 1129360414  |a 1156171735  |a 1179476167  |a 1202552582  |a 1227640268  |a 1240536346  |a 1285756931  |a 1289821061  |a 1302293873 
020 |a 0735622140 
020 |a 9780735622142 
020 |a 9780735635579  |q (electronic bk.) 
020 |a 0735635579  |q (electronic bk.) 
020 |a 0735637474 
020 |a 9780735637474 
029 1 |a DEBBG  |b BV040903081 
029 1 |a DEBSZ  |b 355375125 
029 1 |a DEBSZ  |b 381391671 
029 1 |a HEBIS  |b 291448917 
029 1 |a NZ1  |b 13685833 
029 1 |a AU@  |b 000073550932 
035 |a (OCoLC)73814382  |z (OCoLC)73803756  |z (OCoLC)80850137  |z (OCoLC)606033711  |z (OCoLC)720475661  |z (OCoLC)760806646  |z (OCoLC)777400800  |z (OCoLC)1056413109  |z (OCoLC)1058374443  |z (OCoLC)1060853006  |z (OCoLC)1064068602  |z (OCoLC)1073068415  |z (OCoLC)1083172635  |z (OCoLC)1103263108  |z (OCoLC)1129360414  |z (OCoLC)1156171735  |z (OCoLC)1179476167  |z (OCoLC)1202552582  |z (OCoLC)1227640268  |z (OCoLC)1240536346  |z (OCoLC)1285756931  |z (OCoLC)1289821061  |z (OCoLC)1302293873 
037 |a CL0500000006  |b Safari Books Online 
042 |a dlr 
050 4 |a QA76.9.A25  |b .H68 2006 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.1  |2 22 
049 |a UAMI 
100 1 |a Howard, Michael,  |d 1965- 
245 1 4 |a The security development lifecycle :  |b SDL, a process for developing demonstrably more secure software /  |c Michael Howard, Steve Lipner. 
246 3 0 |a SDL, a process for developing demonstrably more secure software 
260 |a Redmond, Wash. :  |b Microsoft Press,  |c ©2006. 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Best practices 
490 1 |a Microsoft secure software development series 
500 |a Title from title screen. 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
506 |3 Use copy  |f Restrictions unspecified  |2 star  |5 MiAaHDL 
533 |a Electronic reproduction.  |b [Place of publication not identified] :  |c HathiTrust Digital Library,  |d 2011.  |5 MiAaHDL 
538 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.  |u http://purl.oclc.org/DLF/benchrepro0212  |5 MiAaHDL 
583 1 |a digitized  |c 2011  |h HathiTrust Digital Library  |l committed to preserve  |2 pda  |5 MiAaHDL 
520 |a Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs-the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team guide you through each stage of the SDL-from education and design to testing and post-release. You get their first-hand insights, best practices, a practical history of the SDL, and lessons to help you implement the SDL in any development organization. Discover how to: Use a streamlined risk-analysis process to find security design issues before code is committed Apply secure-coding best practices and a proven testing process Conduct a final security review before a product ships Arm customers with prescriptive guidance to configure and deploy your product more securely Establish a plan to respond to new security vulnerabilities Integrate security discipline into agile methods and processes, such as Extreme Programming and Scrum Includes a CD featuring: A six-part security class video conducted by the authors and other Microsoft security experts Sample SDL documents and fuzz testing tool PLUS-Get book updates on the Web. A Note Regarding the CD or DVD The print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer software  |x Development. 
650 0 |a Computer security. 
650 0 |a Computer software  |x Reliability. 
650 6 |a Sécurité informatique. 
650 6 |a Logiciels  |x Fiabilité. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer software  |x Development.  |2 blmlsh 
650 7 |a Computer security.  |2 blmlsh 
650 7 |a Computer software  |x Reliability.  |2 blmlsh 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Computer software  |x Development.  |2 fast  |0 (OCoLC)fst00872537 
650 7 |a Computer software  |x Reliability.  |2 fast  |0 (OCoLC)fst00872585 
700 1 |a Lipner, Steve. 
776 0 8 |i Print version:  |a Howard, Michael, 1965-  |t Security development lifecycle.  |d Redmond, Wash. : Microsoft Press, ©2006  |w (DLC) 2006924466  |w (OCoLC)70211570 
830 0 |a Best practices (Redmond, Wash.) 
830 0 |a Secure software development series. 
856 4 0 |u https://learning.oreilly.com/library/view/~/0735622140/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Baker & Taylor  |b BKTY  |c 34.99  |d 26.24  |i 0735622140  |n 0006604637  |s active 
938 |a ebrary  |b EBRY  |n ebr10762138 
938 |a EBSCOhost  |b EBSC  |n 431778 
938 |a YBP Library Services  |b YANK  |n 3317277 
938 |a YBP Library Services  |b YANK  |n 7470889 
938 |a Internet Archive  |b INAR  |n securitydevelopm0000howa 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26904794 
994 |a 92  |b IZTAP