Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Software security engineering: a guide for project managers
Bookmark Share

Text

Software security engineering: a guide for project managers

Allen, Julia H. - Personal Name;

Terdapat bibliografi dan indeks.

Table of contents:
Chapter 1: Why Is Security a Software Issue?
1.1 Introduction 1
1.2 The Problem 2
1.3 Software Assurance and Software Security 6
1.4 Threats to Software Security 9
1.5 Sources of Software Insecurity 11
1.6 The Benefits of Detecting Software Security Defects Early 13
1.7 Managing Secure Software Development 18
1.8 Summary 23

Chapter 2: What Makes Software Secure?
2.1 Introduction 25
2.2 Defining Properties of Secure Software 26
2.3 How to Influence the Security Properties of Software 36
2.4 How to Assert and Specify Desired Security Properties 61
2.5 Summary

Chapter 3: Requirements Engineering for Secure Software
3.1 Introduction 73
3.2 Misuse and Abuse Cases 78
3.3 The SQUARE Process Model 84
3.4 SQUARE Sample Outputs 91
3.5 Requirements Elicitation 99
3.6 Requirements Prioritization 106
3.7 Summary

Chapter 4: Secure Software Architecture and Design
4.1 Introduction 115
4.2 Software Security Practices for Architecture and Design: Architectural Risk Analysis 119
4.3 Software Security Knowledge for Architecture and Design: Security Principles, Security Guidelines, and Attack Patterns 137
4.4 Summary

Chapter 5: Considerations for Secure Coding and Testing
5.1 Introduction 151
5.2 Code Analysis 152
5.3 Coding Practices 160
5.4 Software Security Testing 163
5.5 Security Testing Considerations Throughout the SDLC 173
5.6 Summary

Chapter 6: Security and Complexity: System Assembly Challenges
6.1 Introduction 183
6.2 Security Failures 186
6.3 Functional and Attacker Perspectives for Security Analysis: Two Examples 189
6.4 System Complexity Drivers and Security 203
6.5 Deep Technical Problem Complexity 215
6.6 Summary 217

Chapter 7: Governance, and Managing for More Secure Software
7.1 Introduction 221
7.2 Governance and Security 223
7.3 Adopting an Enterprise Software Security Framework 226
7.4 How Much Security Is Enough? 236
7.5 Security and Project Management 244
7.6 Maturity of Practice 259
7.7 Summary 266

Chapter 8: Getting Started
8.1 Where to Begin 269
8.2 In Closing 281


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.8 ALL s
b0001435
Available - Available
Detail Information
Series Title
The SEI series in software engineering
Call Number
005.8 ALL s
Publisher
New Jersey : Addison-Wesley., 2008
Collation
xxv, 334 hal.; ilus.; 24 cm
Language
English
ISBN/ISSN
9780321509178
Classification
005.8
Content Type
-
Media Type
-
Carrier Type
-
Edition
--
Subject(s)
Software engineering
Computer security
Komputer -- Pengamanan
Computer networks -- Security measures
Specific Detail Info
--
Statement of Responsibility
Julia H. Allen
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?