Publisher's Synopsis
Learn tracing security requirements through each development phase and mitigating multiple-layer attacks with practical examples, ensuring you emerge with the skills to build resilient applications.
Key Features
- Learn to model security vulnerabilities in the Software Development Lifecycle (SDLC)
- Implement security mitigations in your software projects
- Develop the skill to trace requirement from requirements gathering through to implementation
Book Description
Perfect for any programmer or developer who wants to increase the security of their software projects, this book provides a hands-on approach to secure software development. Explore core concepts like security specification, modeling, and threat mitigation. The iterative approach presented in the book allows for the traceability of security requirements through the phases of software development. We don't stop at the basics. We will dig into multiple-layer attacks and how to think about and prevent them. Through the process, we will present an example application project for the development of an entertainment ticketing software system. In our example, we will consider high-profile security incidents that have affected the musical and performance stars we love to see. This example comes from the author's decades of experience building secure applications in this domain. Embrace secure development with our comprehensive technique in which problem-solving meets practicality. By the end of the book, you'll possess the expertise to systematically secure software projects, from crafting robust security specifications to adeptly mitigating multifaceted threats, ensuring your applications stand resilient in the face of evolving cybersecurity challenges.What you will learn
- Specify non-functional requirements for a software project
- Model vulnerabilities in software design and analysis
- Model threats to a software application
- Mitigate threats in a web application
- Mitigate threats to the database layer of an application
- Trace non-function requirements through secure software design
Who this book is for
Many software development jobs require developing, maintaining, enhancing, administering, and defending software applications, websites, and scripts. This book is designed for software developers and web developers who find themselves in one of these jobs or want to acquire one of these jobs. This book presents applied example use-case in a concise text.
]]>