Skip to content
Scan a barcode
Scan
Added to your cart
Paperback Software Security: Building Security in Book

ISBN: 0321356705

ISBN13: 9780321356703

Software Security: Building Security In (Addison-Wesley Software Security Series)

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Very Good

$8.29
Save $66.70!
List Price $74.99
Almost Gone, Only 1 Left!

Book Overview

"When it comes to software security, the devil is in the details. This book tackles the details."
--Bruce Schneier, CTO and founder, Counterpane, and author of Beyond Fear and Secrets and Lies "McGraw's book shows you how to make the 'culture of security' part of your development lifecycle."
--Howard A. Schmidt, Former White House Cyber Security Advisor "McGraw is leading the charge in software security. His advice is as straightforward as it is actionable. If your business relies on software (and whose doesn't), buy this book and post it up on the lunchroom wall."
--Avi Rubin, Director of the NSF ACCURATE Center; Professor, Johns Hopkins University; and coauthor of Firewalls and Internet Security Beginning where the best-selling book Building Secure Software left off, Software Security teaches you how to put software security into practice.The software security best practices, or touchpoints, described in this book have their basis in good software engineering and involve explicitly pondering security throughout the software development lifecycle. This means knowing and understanding common risks (including implementation bugsand architectural flaws), designing for security, and subjecting all software artifacts to thorough, objective risk analyses and testing. Software Security is about putting the touchpoints to work for you. Because you can apply these touchpoints to the software artifacts you already produce as you develop software, you can adopt this book's methods without radically changing the way you work. Inside you'll find detailed explanations of Risk management frameworks and processes Code review using static analysis tools Architectural risk analysis Penetration testing Security testing Abuse case development In addition to the touchpoints, Software Security covers knowledge management, training and awareness, and enterprise-level software security programs. Now that the world agrees that software security is central to computer security, it is time to put philosophy into practice. Create your own secure development lifecycle by enhancing your existing software development lifecycle with the touchpoints described in this book. Let this expert author show you how to build more secure software by building security in.

You Might Also Enjoy

Exploiting Software: How to Break Code (Addison-Wesley Software Security Series)
Exploiting Software: How to Break Code (Addison-Wesley Software Security Series)
Gary McGraw, Greg Hoglund

from: $7.29

Building Secure Software: How to Avoid Security Problems the Right Way
Building Secure Software: How to Avoid Security Problems the Right Way
Gary McGraw, John Viega, Viega

from: $6.89

Gray Hat Hacking: The Ethical Hacker's Handbook
Gray Hat Hacking: The Ethical Hacker's Handbook
Daniel Regalado, Michael Baucom, Shon Harris, Chris Eagle, Jonathan Ness, Allen Harper

from: $6.49

Advanced Programming in the UNIX Environment
Advanced Programming in the UNIX Environment
W. Richard Stevens

from: $4.79

Rootkits: Subverting the Windows Kernel (Addison-Wesley Software Security Series)
Rootkits: Subverting the Windows Kernel (Addison-Wesley Software Security Series)
Greg Hoglund, Jamie Butler

from: $5.99

Compilers : Principles, Techniques, and Tools
Compilers : Principles, Techniques, and Tools
Monica S. Lam, Ravi Sethi, Jeffrey D. Ullman, Alfred V. Aho, Monica Lam, R. Sethi, Jeffrey D. Aho, Alfred V.; Sethi, Ravi; Ullman

from: $6.69

Programming Pearls
Programming Pearls
Jon L. Bentley

from: $4.79

Code Complete
Code Complete
Steve McConnell

from: $5.89

The C Programming Language
The C Programming Language
Dennis M. Ritchie, Brian W. Kernighan

from: $11.09

Exploiting Online Games: Cheating Massively Distributed Systems (Addison-Wesley Software Security Series)
Exploiting Online Games: Cheating Massively Distributed Systems (Addison-Wesley Software Security Series)
Greg Hoglund, Gary McGraw

from: $6.29

UNIX Network Programming
UNIX Network Programming
W. Richard Stevens

from: $5.59

The C++ Programming Language
The C++ Programming Language
Bjarne Stroustrup

from: $5.19

Design Patterns: Elements of Reusable Object-Oriented Software (Addison-Wesley Professional Computing Series)
Design Patterns: Elements of Reusable Object-Oriented Software (Addison-Wesley Professional Computing Series)
Erich Gamma, Richard Helm, Ralph Johnson, John Vlissides

from: $22.89

Art of Computer Programming, Volume 1: Fundamental Algorithms
Art of Computer Programming, Volume 1: Fundamental Algorithms
Donald Ervin Knuth

from: $14.79

Object-Oriented Analysis and Design with Applications
Object-Oriented Analysis and Design with Applications
Grady Booch

from: $5.09

The Implementation (TCP/IP Illustrated, Volume 2)
The Implementation (TCP/IP Illustrated, Volume 2)
Gary R. Wright, W. Stevens, W. Richard Stevens

from: $16.69

The Art of Software Security Testing: Identifying Software Security Flaws (Symantec Press)
The Art of Software Security Testing: Identifying Software Security Flaws (Symantec Press)
Elfriede Dustin, Dino Dai Zovi, Chris Wysopal, Lucas Nelson

from: $18.19

24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
John Viega, David LeBlanc, Michael Howard

from: $26.59

19 Deadly Sins of Software Security (Security One-off)
19 Deadly Sins of Software Security (Security One-off)
Michael Howard, David LeBlanc, John Viega

from: $6.59

Empire of Mud: The Secret History of Washington, DC
Empire of Mud: The Secret History of Washington, DC
Jeff D. Dickey

from: $12.89

Customer Reviews

5 customer ratings | 5 reviews

Rated 5 stars
Required residing for all software developers

The root cause of many security vulnerabilities is poorly written software. Often, software applications are written without security in mind. The logical, yet elusive, solution is to ensure that software developers are trained in writing secure code. Software Security: Building Security In is a valiant attempt to show software developers how to do just that. The book is the latest step in Gary McGraw's software security...

0Report

Rated 5 stars
A powerful book with deep truths for secure development

I read six books on software security recently, namely "Writing Secure Code, 2nd Ed" by Michael Howard and David LeBlanc; "19 Deadly Sins of Software Security" by Michael Howard, David LeBlanc, and John Viega; "Software Security" by Gary McGraw; "The Security Development Lifecycle" by Michael Howard and Steve Lipner; "High-Assurance Design" by Cliff Berg; and "Security Patterns" by Markus Schumacher, et al. Each book takes...

1Report

Rated 5 stars
Critical reading if you're just getting started

When my company began to investigate software security, we all mistakenly assumed it would be possible to just train the developers what mistakes not to make and all would be well with the world. This book was the first step toward fixing that misunderstanding. Dr. McGraw does an excellent job of describing the environment and the practices that are required when implementing secure coding in the lifecycle. But, he's also...

0Report

Rated 5 stars
Integral to your software development process

Software security is a continual process, requiring first an understanding of the issues. To be effective, this understanding and knowledge must then be incorporated into the software development lifecycle including design, coding, testing, and deployment. Several years ago I helped build a security analysis tool for Windows NT, called NtSpectre. We built the tool to analyze the security configuration of servers designed for...

0Report

Rated 5 stars
A must-have for anyone building networked systems

On the one hand, it is risky for me to praise this book. I make my living teaching and practicing computer security. If everyone writing software these days were to read this book, I might eventually find myself out of business. Gary McGraw, one of the leading security luminaries int he world, has got it right. Security cannot be added to systems once they are built. It must be designed in from the very beginning. The security...

0Report

Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured