Description
This book is a guide for better secure application development and is a guide for professionals wanting to better understand concepts related to cyber security threats and adversaries. The authors have personally experienced several of the topics covered in this book. These “lessons learned” will hopefully benefit other industry professionals by improving their security awareness and saving time by efficiently offering guidance.
The cyber security threats and adversaries active today are profoundly different than they were a few short years ago. The rise of Advanced Persistent Threat (APT) actors that operate on behalf of nations are bringing advanced technologies and funding that yesterday’s hackers only dreamed of. Industrial targeted malware like Stuxnet and supply-chain exploits like those exhibited in the SolarWinds hack would not be possible for less sophisticated adversaries. In the endless game of cat and mouse, these new threats must be met with new defenses.
This book’s objectives are not only to encourage software professionals to focus on security early in the process but also to be responsible for ensuring their organizations embrace best security practices right from the beginning of the process.
Table of Contents
- Introduction
- Cultural Embracement
- Project Planning
- Design
- Code
- Build and Test
- Release and Deploy
- Operate and Monitor
- Index
Reviews
There are no reviews yet.