The security development lifecycle : SDL, a process for developing demonstrably more secure software /
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs-the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipn...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Redmond, Wash. :
Microsoft Press,
©2006.
|
Colección: | Best practices (Redmond, Wash.)
Secure software development series. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
MARC
LEADER | 00000cam a2200000Ia 4500 | ||
---|---|---|---|
001 | OR_ocm73814382 | ||
003 | OCoLC | ||
005 | 20231017213018.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 061020s2006 waua ob 001 0 eng d | ||
010 | |a 2006924466 | ||
040 | |a UMI |b eng |e pn |c UMI |d UMI |d BAKER |d OCLCG |d TXJ |d CEF |d OCLCQ |d MKN |d UAB |d OCLCE |d B24X7 |d DEBSZ |d N$T |d OCLCQ |d OCLCO |d OCLCQ |d E7B |d OCLCF |d OCLCQ |d OCLCO |d YDXCP |d OCLCQ |d OCLCO |d ZAD |d OCLCO |d OCLCQ |d OCLCO |d COO |d OCLCO |d OCLCA |d OCLCQ |d AU@ |d WYU |d OCLCQ |d VT2 |d UK7LJ |d UKQUB |d HS0 |d INARC |d UKAHL |d OCLCO |d DST |d LVT |d OCLCO |d OCLCQ | ||
016 | 7 | |a 2006924466. |2 Uk | |
019 | |a 73803756 |a 80850137 |a 606033711 |a 720475661 |a 760806646 |a 777400800 |a 1056413109 |a 1058374443 |a 1060853006 |a 1064068602 |a 1073068415 |a 1083172635 |a 1103263108 |a 1129360414 |a 1156171735 |a 1179476167 |a 1202552582 |a 1227640268 |a 1240536346 |a 1285756931 |a 1289821061 |a 1302293873 | ||
020 | |a 0735622140 | ||
020 | |a 9780735622142 | ||
020 | |a 9780735635579 |q (electronic bk.) | ||
020 | |a 0735635579 |q (electronic bk.) | ||
020 | |a 0735637474 | ||
020 | |a 9780735637474 | ||
029 | 1 | |a DEBBG |b BV040903081 | |
029 | 1 | |a DEBSZ |b 355375125 | |
029 | 1 | |a DEBSZ |b 381391671 | |
029 | 1 | |a HEBIS |b 291448917 | |
029 | 1 | |a NZ1 |b 13685833 | |
029 | 1 | |a AU@ |b 000073550932 | |
035 | |a (OCoLC)73814382 |z (OCoLC)73803756 |z (OCoLC)80850137 |z (OCoLC)606033711 |z (OCoLC)720475661 |z (OCoLC)760806646 |z (OCoLC)777400800 |z (OCoLC)1056413109 |z (OCoLC)1058374443 |z (OCoLC)1060853006 |z (OCoLC)1064068602 |z (OCoLC)1073068415 |z (OCoLC)1083172635 |z (OCoLC)1103263108 |z (OCoLC)1129360414 |z (OCoLC)1156171735 |z (OCoLC)1179476167 |z (OCoLC)1202552582 |z (OCoLC)1227640268 |z (OCoLC)1240536346 |z (OCoLC)1285756931 |z (OCoLC)1289821061 |z (OCoLC)1302293873 | ||
037 | |a CL0500000006 |b Safari Books Online | ||
042 | |a dlr | ||
050 | 4 | |a QA76.9.A25 |b .H68 2006 | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.1 |2 22 |
049 | |a UAMI | ||
100 | 1 | |a Howard, Michael, |d 1965- | |
245 | 1 | 4 | |a The security development lifecycle : |b SDL, a process for developing demonstrably more secure software / |c Michael Howard, Steve Lipner. |
246 | 3 | 0 | |a SDL, a process for developing demonstrably more secure software |
260 | |a Redmond, Wash. : |b Microsoft Press, |c ©2006. | ||
300 | |a 1 online resource. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Best practices | |
490 | 1 | |a Microsoft secure software development series | |
500 | |a Title from title screen. | ||
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
506 | |3 Use copy |f Restrictions unspecified |2 star |5 MiAaHDL | ||
533 | |a Electronic reproduction. |b [Place of publication not identified] : |c HathiTrust Digital Library, |d 2011. |5 MiAaHDL | ||
538 | |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |u http://purl.oclc.org/DLF/benchrepro0212 |5 MiAaHDL | ||
583 | 1 | |a digitized |c 2011 |h HathiTrust Digital Library |l committed to preserve |2 pda |5 MiAaHDL | |
520 | |a Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs-the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team guide you through each stage of the SDL-from education and design to testing and post-release. You get their first-hand insights, best practices, a practical history of the SDL, and lessons to help you implement the SDL in any development organization. Discover how to: Use a streamlined risk-analysis process to find security design issues before code is committed Apply secure-coding best practices and a proven testing process Conduct a final security review before a product ships Arm customers with prescriptive guidance to configure and deploy your product more securely Establish a plan to respond to new security vulnerabilities Integrate security discipline into agile methods and processes, such as Extreme Programming and Scrum Includes a CD featuring: A six-part security class video conducted by the authors and other Microsoft security experts Sample SDL documents and fuzz testing tool PLUS-Get book updates on the Web. A Note Regarding the CD or DVD The print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com. | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Computer software |x Development. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer software |x Reliability. | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Logiciels |x Fiabilité. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer software |x Development. |2 blmlsh | |
650 | 7 | |a Computer security. |2 blmlsh | |
650 | 7 | |a Computer software |x Reliability. |2 blmlsh | |
650 | 7 | |a Computer security. |2 fast |0 (OCoLC)fst00872484 | |
650 | 7 | |a Computer software |x Development. |2 fast |0 (OCoLC)fst00872537 | |
650 | 7 | |a Computer software |x Reliability. |2 fast |0 (OCoLC)fst00872585 | |
700 | 1 | |a Lipner, Steve. | |
776 | 0 | 8 | |i Print version: |a Howard, Michael, 1965- |t Security development lifecycle. |d Redmond, Wash. : Microsoft Press, ©2006 |w (DLC) 2006924466 |w (OCoLC)70211570 |
830 | 0 | |a Best practices (Redmond, Wash.) | |
830 | 0 | |a Secure software development series. | |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/0735622140/?ar |z Texto completo (Requiere registro previo con correo institucional) |
938 | |a Baker & Taylor |b BKTY |c 34.99 |d 26.24 |i 0735622140 |n 0006604637 |s active | ||
938 | |a ebrary |b EBRY |n ebr10762138 | ||
938 | |a EBSCOhost |b EBSC |n 431778 | ||
938 | |a YBP Library Services |b YANK |n 3317277 | ||
938 | |a YBP Library Services |b YANK |n 7470889 | ||
938 | |a Internet Archive |b INAR |n securitydevelopm0000howa | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH26904794 | ||
994 | |a 92 |b IZTAP |