|Eingestellt in Kategorie:

Sicherheitsorientierte Softwareentwicklung: Lernen Sie Risiken in Ihnen zu analysieren und zu mindern-

Ursprünglicher Text
Security-Driven Software Development: Learn to analyze and mitigate risks in you
grandeagleretail
(947529)
Angemeldet als gewerblicher Verkäufer
US $60,80
Ca.EUR 51,89
Artikelzustand:
Neu
3 verfügbar
Ganz entspannt. Rückgaben akzeptiert.
Versand:
Kostenlos Economy Shipping.
Standort: Fairfield, Ohio, USA
Lieferung:
Lieferung zwischen Mi, 3. Sep und Di, 9. Sep nach 94104 bei heutigem Zahlungseingang
Wir wenden ein spezielles Verfahren zur Einschätzung des Liefertermins an – in diese Schätzung fließen Faktoren wie die Entfernung des Käufers zum Artikelstandort, der gewählte Versandservice, die bisher versandten Artikel des Verkäufers und weitere ein. Insbesondere während saisonaler Spitzenzeiten können die Lieferzeiten abweichen.
Rücknahme:
30 Tage Rückgabe. Käufer zahlt Rückversand. Wenn Sie ein eBay-Versandetikett verwenden, werden die Kosten dafür von Ihrer Rückerstattung abgezogen.
Zahlungen:
   Diners Club 

Sicher einkaufen

eBay-Käuferschutz
Geld zurück, wenn etwas mit diesem Artikel nicht stimmt. Mehr erfahreneBay-Käuferschutz - wird in neuem Fenster oder Tab geöffnet

  • Gratis Rückversand im Inland
  • Punkte für jeden Kauf und Verkauf
  • Exklusive Plus-Deals
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:396908873390

Artikelmerkmale

Artikelzustand
Neu: Neues, ungelesenes, ungebrauchtes Buch in makellosem Zustand ohne fehlende oder beschädigte ...
ISBN-13
9781835462836
Book Title
Security-Driven Software Development
ISBN
9781835462836

Über dieses Produkt

Product Identifiers

Publisher
Packt Publishing, The Limited
ISBN-10
1835462839
ISBN-13
9781835462836
eBay Product ID (ePID)
2336891328

Product Key Features

Language
English
Publication Name
Security-Driven Software Development : Learn to Analyze and Mitigate Risks in Your Software Projects
Publication Year
2024
Subject
Security / Networking
Type
Textbook
Author
Aspen Olmsted
Subject Area
Computers
Format
Trade Paperback

Dimensions

Item Length
92.5 in
Item Width
75 in

Additional Product Features

Intended Audience
Trade
Synopsis
Trace security requirements through each development phase, mitigating multiple-layer attacks with practical examples, and emerge equipped with the skills to build resilient applications Key Features Explore the practical application of secure software development methodologies Model security vulnerabilities throughout the software development lifecycle (SDLC) Develop the skills to trace requirements, from requirements gathering through to implementation Purchase of the print or Kindle book includes a free PDF eBook Book Description Extend your software development skills to integrate security into every aspect of your projects. Perfect for any programmer or developer working on mission-critical applications, this hands-on guide helps you adopt secure software development practices. Explore core concepts like security specifi cation, modeling, and threat mitigation with the iterative approach of this book that allows you to trace security requirements through each phase of software development. You won't stop at the basics; you'll delve into multiple-layer att acks and develop the mindset to prevent them. Through an example application project involving an entertainment ticketing software system, you'll look at high-profi le security incidents that have aff ected popular music stars and performers. Drawing from the author's decades of experience building secure applications in this domain, this book off ers comprehensive techniques where problem-solving meets practicality for secure development. By the end of this book, you'll have gained the expertise to systematically secure software projects, from crafting robust security specifi cations to adeptly mitigating multifaceted threats, ensuring your applications stand resilient in the face of evolving cybersecurity challenges. What you will learn Find out non-functional requirements crucial for software security, performance, and reliability Develop the skills to identify and model vulnerabilities in software design and analysis Analyze and model various threat vectors that pose risks to software applications Acquire strategies to mitigate security threats specific to web applications Address threats to the database layer of an application Trace non-functional requirements through secure software design Who this book is for Many software development jobs require developing, maintaining, enhancing, administering, and defending software applications, websites, and scripts. This book is designed for software developers and web developers seeking to excel in these roles, offering concise explanations and applied example use-cases. Table of Contents Security Principles Designing a Secure Functional Model Designing a Secure Object Model Designing a Secure Dynamic Model Designing a Secure System Model Threat Modeling Authentication and Authorization Input Validation and Sanitization Standard Web Application Vulnerabilities Database Security Unit Testing Regression Testing Integration, System, and Acceptance Testing Software Penetration Testing, Trace security requirements through each development phase, mitigating multiple-layer attacks with practical examples, and emerge equipped with the skills to build resilient applications Key Features Explore the practical application of secure software development methodologies Model security vulnerabilities throughout the software development lifecycle (SDLC) Develop the skills to trace requirements, from requirements gathering through to implementation Purchase of the print or Kindle book includes a free PDF eBook Book Description Extend your software development skills to integrate security into every aspect of your projects. Perfect for any programmer or developer working on mission-critical applications, this hands-on guide helps you adopt secure software development practices. Explore core concepts like security specifi cation, modeling, and threat mitigation with the iterative approach of this book that allows you to trace security requirements through each phase of software development. You won't stop at the basics; you'll delve into multiple-layer att acks and develop the mindset to prevent them. Through an example application project involving an entertainment ticketing software system, you'll look at high-profi le security incidents that have aff ected popular music stars and performers. Drawing from the author's decades of experience building secure applications in this domain, this book off ers comprehensive techniques where problem-solving meets practicality for secure development.By the end of this book, you'll have gained the expertise to systematically secure software projects, from crafting robust security specifi cations to adeptly mitigating multifaceted threats, ensuring your applications stand resilient in the face of evolving cybersecurity challenges. What you will learn Find out non-functional requirements crucial for software security, performance, and reliability Develop the skills to identify and model vulnerabilities in software design and analysis Analyze and model various threat vectors that pose risks to software applications Acquire strategies to mitigate security threats specific to web applications Address threats to the database layer of an application Trace non-functional requirements through secure software design Who this book is for Many software development jobs require developing, maintaining, enhancing, administering, and defending software applications, websites, and scripts. This book is designed for software developers and web developers seeking to excel in these roles, offering concise explanations and applied example use-cases. ]]>

Artikelbeschreibung des Verkäufers

Rechtliche Informationen des Verkäufers

Ich versichere, dass alle meine Verkaufsaktivitäten in Übereinstimmung mit allen geltenden Gesetzen und Vorschriften der EU erfolgen.
Info zu diesem Verkäufer

grandeagleretail

98,2% positive Bewertungen2,8 Mio. Artikel verkauft

Mitglied seit Sep 2010
Antwortet meist innerhalb 12 Stunden
Angemeldet als gewerblicher Verkäufer
Grand Eagle Retail is your online bookstore. We offer Great books, Great prices and Great service.
Shop besuchenKontakt

Detaillierte Verkäuferbewertungen

Durchschnitt in den letzten 12 Monaten
Genaue Beschreibung
4.9
Angemessene Versandkosten
5.0
Lieferzeit
5.0
Kommunikation
4.9

Verkäuferbewertungen (1.055.976)

Alle Bewertungen
Positiv
Neutral
Negativ
  • c***a (121)- Bewertung vom Käufer.
    Letzter Monat
    Bestätigter Kauf
    The seller was very responsive and answered me on a timely matter. The product itself came in its packaging and was new, not used at all. The packaging was not beat up or anything, safely delivered to my mailbox. No mix ups and zero stress with delivery. The price for the product is completely understandable for the product. I really appreciate the seller and I am very happy to have purchased through this seller. Completely trustable!
  • m***4 (1603)- Bewertung vom Käufer.
    Letzter Monat
    Bestätigter Kauf
    Leaving positive feedback because 1) item was packed well & arrived as described 2) seller did give partial refund when subsequent price dropped below org purchase price. 3) communication was quick However, there was a downside to this transaction -item listed as in-stock but ended up waiting nearly a month for them to get it from their distributer then ship it to me (bought June 29th, arrived around July 21). Auction said 12-15 days. Better clarity would have prevented lot of frustration
  • w***i (875)- Bewertung vom Käufer.
    Letzter Monat
    Bestätigter Kauf
    Absolutely Wonderful Seller!! Terrific Item As Described!!! Great Service and Communication!! Shipped In Waterproof Packaging!! I Received Item In About One Week!! Very Pleased With Seller! I Will Buy From This Seller Again!!