The security development lifecycle: SDL, a process for developing demonstrably more secure software
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs—the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team guide you through each stage of the SDL—from education and design to testing and post-release. You get their first-hand insights, best practices, a practical history of the SDL, and lessons to help you implement the SDL in any development organization.
Discover how to:
Includes a CD featuring:
PLUS—Get book updates on the Web.
A Note Regarding the CD or DVD
The print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to firstname.lastname@example.org.
この書籍の 13 ページで ActiveX が見つかりました
検索結果1-3 / 13
レビュー - レビューを書く
Review: The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Softwareユーザー レビュー - Alex Ott - Goodreads
Very useful book on organizing security-related development process. Although, sometimes it mentions Microsoft technologies, but most of times authors discuss generic security-related issues ... レビュー全文を読む
Review: The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Softwareユーザー レビュー - JD - Goodreads
The way forward. レビュー全文を読む
The Need for the
The Threats Have Changed
Current Software Development Methods Fail to Produce Secure Software
他の 27 セクションは表示されていません