Secure and Resilient Software Development

Mark S. Merkow, Lakshmikanth Raghavan

Auerbach Publications
Published June 16, 2010
Reference - 392 Pages - 57 B/W Illustrations
ISBN 9781439826966 - CAT# K11327

For Instructors Request Inspection Copy


Add to Wish List
FREE Standard Shipping!


  • Guides developers in incorporating security testing practices in application development, which helps identify and fix problems early and results in significant cost and time savings
  • Provides comprehensive coverage of quality software development practices stressing resilience activities
  • Presents precise, actionable, and practical strategies that connect directly with developers
  • Shows developers how to master non-functional requirements, including reliability, security, and resilience


Although many software books highlight open problems in secure software development, few provide easily actionable, ground-level solutions. Breaking the mold, Secure and Resilient Software Development teaches you how to apply best practices and standards for consistent and secure software development. It details specific quality software development strategies and practices that stress resilience requirements with precise, actionable, and ground-level inputs.

Providing comprehensive coverage, the book illustrates all phases of the secure software development life cycle. It shows developers how to master non-functional requirements including reliability, security, and resilience. The authors provide expert-level guidance through all phases of the process and supply many best practices, principles, testing practices, and design methodologies.

For updates to this book and ongoing activities of interest to the secure and resilient software community, please visit:

"Secure and Resilient Software Development provides a strong foundation for anyone getting started in application security. Most application security books fall into two categories: business-oriented and vague or ridiculously super technical. Mark and Laksh draw on their extensive experience to bridge this gap effectively. The book consistently links important technical concepts back to the business reasons for application security with interesting stories about real companies dealing with application security issues."

—Jeff Williams, Chair, The OWASP Foundation


We provide complimentary e-inspection copies of primary textbooks to instructors considering our books for course adoption.

Request an
e-inspection copy

Share this Title