Enterprise Software Security
Home > Computing and Information Technology > Computer security > Enterprise Software Security: A Confluence of Disciplines
Enterprise Software Security: A Confluence of Disciplines

Enterprise Software Security: A Confluence of Disciplines


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

STRENGTHEN SOFTWARE SECURITY BY HELPING DEVELOPERS AND SECURITY EXPERTS WORK TOGETHER   Traditional approaches to securing software are inadequate. The solution: Bring software engineering and network security teams together in a new, holistic approach to protecting the entire enterprise. Now, four highly respected security experts explain why this “confluence” is so crucial, and show how to implement it in your organization.   Writing for all software and security practitioners and leaders, they show how software can play a vital, active role in protecting your organization. You’ll learn how to construct software that actively safeguards sensitive data and business processes and contributes to intrusion detection/response in sophisticated new ways. The authors cover the entire development lifecycle, including project inception, design, implementation, testing, deployment, operation, and maintenance. They also provide a full chapter of advice specifically for Chief Information Security Officers and other enterprise security executives. Whatever your software security responsibilities, Enterprise Software Security delivers indispensable big-picture guidance–and specific, high-value recommendations you can apply right now.   COVERAGE INCLUDES: • Overcoming common obstacles to collaboration between developers and IT security professionals • Helping programmers design, write, deploy, and operate more secure software • Helping network security engineers use application output more effectively • Organizing a software security team before you’ve even created requirements • Avoiding the unmanageable complexity and inherent flaws of layered security • Implementing positive software design practices and identifying security defects in existing designs • Teaming to improve code reviews, clarify attack scenarios associated with vulnerable code, and validate positive compliance • Moving beyond pentesting toward more comprehensive security testing • Integrating your new application with your existing security infrastructure • “Ruggedizing” DevOps by adding infosec to the relationship between development and operations • Protecting application security during maintenance

Table of Contents:
Preface     xiii 1 Introduction to the Problem    1 Our Shared Predicament Today    2 Why Are We in This Security Mess?     5 Ancient History     7 All Together Now     11 The Status Quo: A Great Divide     15 What’s Wrong with This Picture?     20 Wait, It Gets Worse     25 Stressing the Positive     27 Summing Up     30 Endnotes     31 2 Project Inception     33 Without a Formal Software Security Process–The Norm Today    34 The Case for a Project Security Team     42 Tasks for the Project Security Team     43 Putting Together the Project Security Team     50 Roles to Cover on the Security Team     51 Some Final Practical Considerations about Project Security Teams     64 Summing Up     67 Endnotes     68 3 Design Activities    71 Security Tiers     72 On Confluence     76 Requirements     78 Specifications     98 Design and Architecture    100 It’s Already Designed     112 Deployment and Operations Planning     115 Summing Up     121 Endnotes     121 4 Implementation Activities    123 Confluence     123 Stress the Positive and Strike the Balance    124 Security Mechanisms and Controls     126 Code Reuse     146 Coding Resources     148 Implementing Security Tiers    152 Code Reviews     154 A Day in the Life of a Servlet    157 Summing Up     167 Endnotes     167 5 Testing Activities    169 A Few Questions about Security Testing    170 Tools of the Trade     180 Security Bug Life Cycle     185 Summing Up     191 Endnotes     192 6 Deployment and Integration    193 How Does Deployment Relate to Confluence?     194 A Road Map     194 Advanced Topics in Deployment    198 Integrating with the Security Operations Infrastructure    200 Third-Generation Log Analysis Tools     213 Retrofitting Legacy and Third-Party Components     216 Notes for Small Shops or Individuals     217 Summing Up     219 Endnotes     220 7 Operating Software Securely     221 Adjusting Security Thresholds     222 Dealing with IDS in Operations     230 Identifying Critical Applications     236 CSIRT Utilization     237 Notes for Small Shops or Individuals    238 Summing Up     240 8 Maintaining Software Securely    241 Common Pitfalls     243 How Does Maintaining Software Securely Relate to Confluence?     248 Learning from History     249 Evolving Threats     251 The Security Patch     254 Special Cases     256 How Does Maintaining Software Securely Fit into Security SDLCs?     259 Summing Up     261 Endnotes     262 9 The View from the Center    263 Ideas for Encouraging Confluent Application Development    265 Toward a Confluent Network     269 Security Awareness and Training     273 Policies, Standards, and Guidelines     274 The Role of Other Departments and Corporate Entities    275 Resource Budgeting and Strategic Planning for Confluence     277 Assessment Tools and Techniques     279 Mobile Plans–Postmortem Interviews     289 Notes for Small Shops or Individuals     292 Summing Up     292 Endnotes     293 Index    295

About the Author :
Kenneth R. van Wyk is a career security guy, having started with Carnegie Mellon University’s CERT/CC in the late 1980s and subsequently worked for the United States Department of Defense and in several senior technologist roles in the commercial sector. He is the co-author of two popular O’Reilly and Associates books on incident response and secure coding. He now owns and runs KRvW Associates, LLC, a software security consulting and training practice in Virginia, USA. Mark G. Graff is the CISO of NASDAQ OMX. Formerly the chief cybersecurity strategist at Lawrence Livermore National Laboratory, he has appeared as an expert witness on computer security before Congress and analyzed electronic voting machine software security for the state of California. A past chairman of the International Forum of Incident Response and Security Teams (FIRST), Graff has lectured on risk analysis, the future of cyber security, and privacy before the American Academy for the Advancement of Science, the Federal Communications Commission (FCC), the Pentagon, and many U.S. national security facilities and think tanks. Dan S. Peters has been involved with security for longer than he had first expected when he stumbled into this field out of curiosity while making a good living as a consultant and a commercial software developer. Many security disciplines are exciting to him, but mobile security has been the most intriguing topic as of late. Before working on this book, Dan repeatedly shared his passion for security in conference presentations and numerous publications. Diana L. Burley, Ph.D., is an award-winning cyber-security workforce expert who has been honored by the U.S. Federal CIO Council and was named the CISSE 2014 Cybersecurity Educator of the Year. As a professor, researcher, and consultant on IT use and workforce development for nearly 20 years, she passionately promotes a holistic view of cyber security to influence education, policy, and practice from her home in the Washington, D.C., region.


Best Sellers


Product Details
  • ISBN-13: 9780321604354
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Addison-Wesley Educational Publishers Inc
  • Language: English
  • Sub Title: A Confluence of Disciplines
  • ISBN-10: 0321604350
  • Publisher Date: 24 Nov 2014
  • Binding: Digital download
  • No of Pages: 320
  • Weight: 1 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Enterprise Software Security: A Confluence of Disciplines
Pearson Education (US) -
Enterprise Software Security: A Confluence of Disciplines
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Enterprise Software Security: A Confluence of Disciplines

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!