|In vendita nella categoria:
Ne hai uno da vendere?

Security-Driven Software Development: Learn to analyze and mitigate risks in you

grandeagleretail
(948028)
Registrato come venditore professionale
US $60,80
CircaEUR 52,03
Condizione:
Nuovo
3 disponibili
Goditi i vantaggi. Restituzioni accettate.
Spedizione:
Gratis Economy Shipping.
Oggetto che si trova a: Fairfield, Ohio, Stati Uniti
Consegna:
Consegna prevista tra il mer 10 set e il mar 16 set a 94104
I tempi di consegna previsti utilizzando il metodo proprietario di eBay, che è basato sulla vicinanza dell'acquirente rispetto al luogo in cui si trova l'oggetto, sul servizio di spedizione selezionato, sulla cronologia di spedizione del venditore e su altri fattori. I tempi di consegna possono variare, specialmente durante le festività.
Restituzioni:
Restituzioni entro 30 giorni. Le spese di spedizione del reso sono a carico dell'acquirente..
Pagamenti:
    Diners Club

Fai shopping in tutta sicurezza

Garanzia cliente eBay
Se non ricevi l'oggetto che hai ordinato, riceverai il rimborso. Scopri di piùGaranzia cliente eBay - viene aperta una nuova finestra o scheda
Il venditore si assume la piena responsabilità della messa in vendita dell'oggetto.
Numero oggetto eBay:396908873390

Specifiche dell'oggetto

Condizione
Nuovo: Libro nuovo, intatto e non letto, in perfette condizioni, senza pagine mancanti o ...
ISBN-13
9781835462836
Book Title
Security-Driven Software Development
ISBN
9781835462836

Informazioni su questo prodotto

Product Identifiers

Publisher
Packt Publishing, The Limited
ISBN-10
1835462839
ISBN-13
9781835462836
eBay Product ID (ePID)
2336891328

Product Key Features

Language
English
Publication Name
Security-Driven Software Development : Learn to Analyze and Mitigate Risks in Your Software Projects
Publication Year
2024
Subject
Security / Networking
Type
Textbook
Author
Aspen Olmsted
Subject Area
Computers
Format
Trade Paperback

Dimensions

Item Length
92.5 in
Item Width
75 in

Additional Product Features

Intended Audience
Trade
Synopsis
Trace security requirements through each development phase, mitigating multiple-layer attacks with practical examples, and emerge equipped with the skills to build resilient applications Key Features Explore the practical application of secure software development methodologies Model security vulnerabilities throughout the software development lifecycle (SDLC) Develop the skills to trace requirements, from requirements gathering through to implementation Purchase of the print or Kindle book includes a free PDF eBook Book Description Extend your software development skills to integrate security into every aspect of your projects. Perfect for any programmer or developer working on mission-critical applications, this hands-on guide helps you adopt secure software development practices. Explore core concepts like security specifi cation, modeling, and threat mitigation with the iterative approach of this book that allows you to trace security requirements through each phase of software development. You won't stop at the basics; you'll delve into multiple-layer att acks and develop the mindset to prevent them. Through an example application project involving an entertainment ticketing software system, you'll look at high-profi le security incidents that have aff ected popular music stars and performers. Drawing from the author's decades of experience building secure applications in this domain, this book off ers comprehensive techniques where problem-solving meets practicality for secure development. By the end of this book, you'll have gained the expertise to systematically secure software projects, from crafting robust security specifi cations to adeptly mitigating multifaceted threats, ensuring your applications stand resilient in the face of evolving cybersecurity challenges. What you will learn Find out non-functional requirements crucial for software security, performance, and reliability Develop the skills to identify and model vulnerabilities in software design and analysis Analyze and model various threat vectors that pose risks to software applications Acquire strategies to mitigate security threats specific to web applications Address threats to the database layer of an application Trace non-functional requirements through secure software design Who this book is for Many software development jobs require developing, maintaining, enhancing, administering, and defending software applications, websites, and scripts. This book is designed for software developers and web developers seeking to excel in these roles, offering concise explanations and applied example use-cases. Table of Contents Security Principles Designing a Secure Functional Model Designing a Secure Object Model Designing a Secure Dynamic Model Designing a Secure System Model Threat Modeling Authentication and Authorization Input Validation and Sanitization Standard Web Application Vulnerabilities Database Security Unit Testing Regression Testing Integration, System, and Acceptance Testing Software Penetration Testing, Trace security requirements through each development phase, mitigating multiple-layer attacks with practical examples, and emerge equipped with the skills to build resilient applications Key Features Explore the practical application of secure software development methodologies Model security vulnerabilities throughout the software development lifecycle (SDLC) Develop the skills to trace requirements, from requirements gathering through to implementation Purchase of the print or Kindle book includes a free PDF eBook Book Description Extend your software development skills to integrate security into every aspect of your projects. Perfect for any programmer or developer working on mission-critical applications, this hands-on guide helps you adopt secure software development practices. Explore core concepts like security specifi cation, modeling, and threat mitigation with the iterative approach of this book that allows you to trace security requirements through each phase of software development. You won't stop at the basics; you'll delve into multiple-layer att acks and develop the mindset to prevent them. Through an example application project involving an entertainment ticketing software system, you'll look at high-profi le security incidents that have aff ected popular music stars and performers. Drawing from the author's decades of experience building secure applications in this domain, this book off ers comprehensive techniques where problem-solving meets practicality for secure development.By the end of this book, you'll have gained the expertise to systematically secure software projects, from crafting robust security specifi cations to adeptly mitigating multifaceted threats, ensuring your applications stand resilient in the face of evolving cybersecurity challenges. What you will learn Find out non-functional requirements crucial for software security, performance, and reliability Develop the skills to identify and model vulnerabilities in software design and analysis Analyze and model various threat vectors that pose risks to software applications Acquire strategies to mitigate security threats specific to web applications Address threats to the database layer of an application Trace non-functional requirements through secure software design Who this book is for Many software development jobs require developing, maintaining, enhancing, administering, and defending software applications, websites, and scripts. This book is designed for software developers and web developers seeking to excel in these roles, offering concise explanations and applied example use-cases. ]]>

Descrizione dell'oggetto fatta dal venditore

Informazioni sul venditore professionale

Certifico che tutte le mie attività di vendita saranno conformi alle leggi e ai regolamenti dell'Unione europea.
Informazioni su questo venditore

grandeagleretail

98,2% di Feedback positivi2,8 milioni oggetti venduti

Su eBay da set 2010
In genere risponde entro 24 ore
Registrato come venditore professionale
Grand Eagle Retail is your online bookstore. We offer Great books, Great prices and Great service.

Valutazione dettagliata del venditore

Media degli ultimi 12 mesi
Descrizione
4.9
Spese spedizione
5.0
Tempi di spedizione
5.0
Comunicazione
4.9

Feedback sul venditore (1.056.557)

Tutti i punteggi
Positivo
Neutro
Negativo
  • c***a (121)- Feedback lasciato dall'acquirente.
    Mese scorso
    Acquisto verificato
    The seller was very responsive and answered me on a timely matter. The product itself came in its packaging and was new, not used at all. The packaging was not beat up or anything, safely delivered to my mailbox. No mix ups and zero stress with delivery. The price for the product is completely understandable for the product. I really appreciate the seller and I am very happy to have purchased through this seller. Completely trustable!
  • m***4 (1605)- Feedback lasciato dall'acquirente.
    Mese scorso
    Acquisto verificato
    Leaving positive feedback because 1) item was packed well & arrived as described 2) seller did give partial refund when subsequent price dropped below org purchase price. 3) communication was quick However, there was a downside to this transaction -item listed as in-stock but ended up waiting nearly a month for them to get it from their distributer then ship it to me (bought June 29th, arrived around July 21). Auction said 12-15 days. Better clarity would have prevented lot of frustration
  • w***i (875)- Feedback lasciato dall'acquirente.
    Ultimi 6 mesi
    Acquisto verificato
    Absolutely Wonderful Seller!! Terrific Item As Described!!! Great Service and Communication!! Shipped In Waterproof Packaging!! I Received Item In About One Week!! Very Pleased With Seller! I Will Buy From This Seller Again!!