Get Free Shipping on orders over $79
Architecting Secure Software Systems - Asoke K. Talukder

Architecting Secure Software Systems

By: Asoke K. Talukder, Manish Chaitanya

eText | 17 December 2008 | Edition Number 1

At a Glance

eText


$123.20

or 4 interest-free payments of $30.80 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Traditionally, software engineers have defined security as a non-functional requirement. As such, all too often it is only considered as an afterthought, making software applications and services vulnerable to attacks. With the phenomenal growth in cybercrime, it has become imperative that security be an integral part of software engineering so that all software assets are protected and safe. Architecting Secure Software Systems defines how security should be incorporated into basic software engineering at the requirement analysis phase, continuing this sharp focus into security design, secured programming, security testing, and secured deployment.

Outlines Protection Protocols for Numerous Applications

Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments. Finally, they explore the security of telecommunications and other distributed services through Service Oriented Architecture (SOA). The book employs a versatile multi-platform approach that allows users to seamlessly integrate the material into their own programming paradigm regardless of their individual programming backgrounds. The text also provides real-world code snippets for experimentation.

Define a Security Methodology from the Initial Phase of Development

Almost all assets in our lives have a virtual presence and the convergence of computer information and telecommunications makes these assets accessible to everyone in the world. This volume enables developers, engineers, and architects to approach security in a holistic fashion at the beginning of the software development phase.

on
Desktop
Tablet
Mobile

Other Editions and Formats

Paperback

Published: 23rd September 2019

More in Computer Science

Amazon.com : Get Big Fast - Robert Spector

eBOOK

ReFormat : Windows 11 - Adam Natad

eBOOK

AI-Powered Search - Trey Grainger

eBOOK