This text offers college students in Information Security Programs an accessible and practical guide on securing software development practices, regardless of which development methodology is used. It is written with a contemporary view on securing all types of software development practices or methodologies.
This text offers college students in Information Security Programs an accessible and practical guide on securing software development practices, regardless of which development methodology is used. It is written with a contemporary view on securing all types of software development practices or methodologies.
Dedication. Contents. List of Figures and Tables. Preface. About the Author. Chapter 1: Today s Software Development Practices Shatter Old Security Practices. Chapter 2: Deconstructing Agile and Scrum. Chapter 3: Learning Is FUNdamental! Chapter 4: Product Backlog Development Building Security In. Chapter 5: Secure Design Considerations. Chapter 6: Security in the Design Sprint. Chapter 7: Defensive Programming. Chapter 8: Testing Part 1: Static Code Analysis. Chapter 9: Testing Part 2: Penetration Testing/Dynamic Analysis/IAST/RASP. Chapter 10: Securing DevOps. Chapter 11: Metrics and Models for AppSec Maturity. Chapter 12: Frontiers for AppSec. Chapter 13: AppSec Is a Marathon Not a Sprint! Appendix A: Security Acceptance Criteria. Appendix B: Resources for AppSec. Appendix C: Answers to Chapter Quick Check Questions. Glossary. Index.
Dedication. Contents. List of Figures and Tables. Preface. About the Author. Chapter 1: Today s Software Development Practices Shatter Old Security Practices. Chapter 2: Deconstructing Agile and Scrum. Chapter 3: Learning Is FUNdamental! Chapter 4: Product Backlog Development Building Security In. Chapter 5: Secure Design Considerations. Chapter 6: Security in the Design Sprint. Chapter 7: Defensive Programming. Chapter 8: Testing Part 1: Static Code Analysis. Chapter 9: Testing Part 2: Penetration Testing/Dynamic Analysis/IAST/RASP. Chapter 10: Securing DevOps. Chapter 11: Metrics and Models for AppSec Maturity. Chapter 12: Frontiers for AppSec. Chapter 13: AppSec Is a Marathon Not a Sprint! Appendix A: Security Acceptance Criteria. Appendix B: Resources for AppSec. Appendix C: Answers to Chapter Quick Check Questions. Glossary. Index.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309