| 000 | 02513 a2200265 4500 | ||
|---|---|---|---|
| 008 | 2013 | ||
| 020 | _a9781449626327 | ||
| 040 |
_aGAMADERO _bspa _cGAMADERO |
||
| 041 | _aeng | ||
| 050 | 0 | 0 |
_aQA76.76D47 _bR537 _c2013 |
| 100 | _aTheodor Richardson | ||
| 245 | _aSecure software design / | ||
| 260 |
_bJones & Bartlett Learning _aUnited States of America |
||
| 300 |
_a407 _bIlustracion _c19 x 23 cm |
||
| 505 | _aPreface xv Chapter 1 Introduction 1 1.1 1.2 1.3 1.4 1.5 The World Turned Upside Down 2 The Lingo 3 The Usual Suspects 5 The Many Hats of Hackers 10 The Tools of the Trade 13 1.5.1 The CIA Triad 13 1.5.2 Cryptography 15 1.5.3 Public Key Cryptography 16 1.5.4 Integrity 17 1.5.5 Availability 18 1.6 Fighting Fire 18 1.6.1 1 Prevention 18 1.6.2 Avoidance 19 1.6.3 Detection 20 1.6.4 Recovery 20 1.7 Changing the Design 21 1.8 Red vs. Blue 24 1.9 The Shape of Things 24 1.10 Chapter Summary 26 1.11 Chapter Exercise 26 1.12 Business Application 26 1.13 Key Concepts and Terms 27 1.14 Assessment 27 1.15 Critical Thinking 28 1.16 Graduate Focus 29 1.17 Bibliography 3 | ||
| 520 | _aWith the multitude of existing attacks that are known to date and the number that will continue to emerge, software security is in a reactive state and many have predicted that it will remain so for the foreseeable future. This book seeks to change that opinion by presenting a practical guide to proactive software security. Secure Software Design is written for the student, the developer, and management to bring a new way of thinking to secure software design. The focus of this book is on analyzing risks, understanding likely points of attack, and pre-deciding how your software will deal with the attack that will inevitably arise. By looking at the systemic threats in any deployment environment and studying the vulnerabilities of your application, this book will show you how to construct software that can deal with attacks both known and unknown instead of waiting for catastrophe and the cleanup efforts of tomorrow. Hands-on examples and simulated cases for the novice and the professional support each chapter by demonstrating the principles presented. | ||
| 526 | _aIngeniería en Tecnologías de la Información y Comunicación | ||
| 650 | 0 |
_aProgramación _9729 |
|
| 700 | _aCharles N. Thies. | ||
| 942 |
_cLIB _2ddc _e1ra |
||
| 945 |
_a1 _badmin _c1260 _dNorma Gabriela Corona Arreguin |
||
| 999 |
_c7038 _d7038 |
||