Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex
FRANCE

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02


Url canonique : www.lavoisier.fr/livre/informatique/secure-resilient-and-agile-software-development/descriptif_4273837
Url courte ou permalien : www.lavoisier.fr/livre/notice.asp?ouvrage=4273837

Secure, Resilient, and Agile Software Development

Langue : Anglais

Auteur :

Couverture de l’ouvrage Secure, Resilient, and Agile Software Development

A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Developmentleaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security for practical people. Written to aid your career as well as your organization, the book shows how to gain skills in secure and resilient software development and related tasks. The book explains how to integrate these development skills into your daily duties, thereby increasing your professional value to your company, your management, your community, and your industry. Secure, Resilient, and Agile Software Developmentwas written for the following professionals:

  • AppSec architects and program managers in information security organizations
  • Enterprise architecture teams with application development focus
  • Scrum teams
  • DevOps teams
  • Product owners and their managers
  • Project managers
  • Application security auditors

With a detailed look at Agile and Scrum software development methodologies, this book explains how security controls need to change in light of an entirely new paradigm on how software is developed. It focuses on ways to educate everyone who has a hand in any software development project with appropriate and practical skills to Build Security In. After covering foundational and fundamental principles for secure application design, this book dives into concepts, techniques, and design goals to meet well-understood acceptance criteria on features an application must implement. It also explains how the design sprint is adapted for proper consideration of security as well as defensive programming techniques. The book concludes with a look at white box application analysis and sprint-based activities to improve the security and quality of software under development.

Dedication

Contents

Preface

About the Author

Chapter 1: Today’s Software Development Practices Shatter Old Security Practices

Chapter 2: Deconstructing Agile and Scrum

Chapter 3: Learning Is FUNdamental!

Chapter 4: Product Backlog Development—Building Security In

Chapter 5: Secure Design Considerations

Chapter 6: Security in the Design Sprint

Chapter 7: Defensive Programming

Chapter 8: Testing Part 1: Static Code Analysis

Chapter 9: Testing Part 2: Penetration Testing/Dynamic Analysis/IAST/RASP

Chapter 10: Securing DevOps

Chapter 11: Metrics and Models for AppSec Maturity

Chapter 12: Frontiers for AppSec

Chapter 13: AppSec Is a Marathon—Not a Sprint!

Appendix A: Sample Acceptance Criteria for Security Controls

Appendix B: Resources for AppSec

Index

Professional Practice & Development

Mark S. Merkow, CISSP, CISM, CSSLP, works at WageWorks in Tempe, Arizona, leading application security architecture and engineering efforts in the office of the CISO. Mark has over 40 years of experience in IT in a variety of roles, including application development, systems analysis and design, security engineering, and security management. Mark holds a Master of Science in Decision and Information Systems from Arizona State University (ASU), a Master of Education in Distance Education from ASU, and a Bachelor of Science in Computer Information Systems from ASU. In addition to his day job, Mark engages in a number of extracurricular activities, including consulting, course development, online course instruction, and book writing. Mark has authored or co-authored 17 books on IT and has been a contributing editor to four others. Mark remains very active in the information security community, working in a variety of volunteer roles for the Phoenix Chapter of (ISC)2®, ISACA®, and OWASP. You can find Mark’s LinkedIn® profile at: linkedin.com/in/markmerkow

Date de parution :

15.6x23.4 cm

Disponible chez l'éditeur (délai d'approvisionnement : 14 jours).

Prix indicatif 53,83 €

Ajouter au panier

Date de parution :

15.6x23.4 cm

Disponible chez l'éditeur (délai d'approvisionnement : 14 jours).

85,88 €

Ajouter au panier

Ces ouvrages sont susceptibles de vous intéresser