Low Price Guarantee
We Take School POs
Architecting Secure Software Systems
Contributor(s): Talukder, Asoke K. (Author), Chaitanya, Manish (Author)

View larger image

ISBN: 1420087843     ISBN-13: 9781420087840
Publisher: Auerbach Publications
OUR PRICE: $142.50  

Binding Type: Hardcover - See All Available Formats & Editions
Published: January 2009
Qty:
Temporarily out of stock - Will ship within 2 to 5 weeks

Annotation: Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, and Web environments. Finally, they explore the security of telecommunications and other distributed services through Service Oriented Architecture (SOA). The book employs a versatile multi-platform approach which allows users to seamlessly integrate the material into their own programming paradigm regardless of their individual programming backgrounds. The text also provides real-world code snippets for experimentation.
Additional Information
BISAC Categories:
- Business & Economics | Commerce
- Computers | Security - General
- Computers | Software Development & Engineering - General
Dewey: 005.8
LCCN: 2008024408
Physical Information: 1.3" H x 7.2" W x 10.1" L (2.20 lbs) 446 pages
Features: Bibliography, Illustrated, Index
Review Citations: Scitech Book News 06/01/2009 pg. 24
 
Descriptions, Reviews, Etc.
Publisher Description:

Traditionally, software engineers have defined security as a non-functional requirement. As such, all too often it is only considered as an afterthought, making software applications and services vulnerable to attacks. With the phenomenal growth in cybercrime, it has become imperative that security be an integral part of software engineering so that all software assets are protected and safe. Architecting Secure Software Systems defines how security should be incorporated into basic software engineering at the requirement analysis phase, continuing this sharp focus into security design, secured programming, security testing, and secured deployment.

Outlines Protection Protocols for Numerous Applications

Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments. Finally, they explore the security of telecommunications and other distributed services through Service Oriented Architecture (SOA). The book employs a versatile multi-platform approach that allows users to seamlessly integrate the material into their own programming paradigm regardless of their individual programming backgrounds. The text also provides real-world code snippets for experimentation.

Define a Security Methodology from the Initial Phase of Development

Almost all assets in our lives have a virtual presence and the convergence of computer information and telecommunications makes these assets accessible to everyone in the world. This volume enables developers, engineers, and architects to approach security in a holistic fashion at the beginning of the software development li

 
Customer ReviewsSubmit your own review
 
To tell a friend about this book, you must Sign In First!