The 7 Qualities of Highly Secure Software

Mano Paul

Hardback
$42.36

eBook
from $24.00

May 29, 2012 by Auerbach Publications
Professional - 160 Pages - 25 B/W Illustrations
ISBN 9781439814468 - CAT# K10743

FREE Standard Shipping!

was $52.95

$42.36

SAVE $10.59

Add to Cart
Add to Wish List

Features

  • Provides an understanding of the necessary security concepts
  • Presents the practical application of security concepts in building software assurance or hack-resilient software
  • Highlights parallels between habits and qualities in terms of software security
  • Includes seven specific qualities required for highly secure software

Summary

The 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies—ranging from Aesop’s fables, athletics, architecture, biology, nursery rhymes, and video games—to illustrate the qualities that are essential for the development of highly secure software.

Each chapter details one of the seven qualities that can make your software highly secure and less susceptible to hacker threats. Leveraging real-world experiences and examples, the book:

  • Explains complex security concepts in language that is easy to understand for professionals involved in management, software development, and operations
  • Specifies the qualities and skills that are essential for building secure software
  • Highlights the parallels between the habits of effective people and qualities in terms of software security

Praise for the Book:

This will be required reading for my executives, security team, software architects and lead developers.
—David W. Stender, CISSP, CSSLP, CAP, CISO of the US Internal Revenue Service

Developing highly secure software should be at the forefront of organizational strategy and this book provides a framework to do so.
—Troy Leach, CTO, PCI Security Standards Council

This book will teach you the core, critical skills needed to raise the security bar on the attackers and swing the game in your favor.
—Michael Howard, Principal Cyber Security Program Manager, Microsoft

As a penetration tester, my job will be a lot harder as people read this book!
—Kevin Johnson, Security Consultant, Secure Ideas