Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Secure and resilient software development / (Record no. 6941)

MARC details
000 -LEADER
fixed length control field 08052cam a2200373 i 4500
001 - CONTROL NUMBER
control field 16178380
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210427094150.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100408s2010 flua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2010013383
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781439826966 (hardcover : alk. paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 143982696X (hardcover : alk. paper)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency YDX
-- BTCTA
-- YDXCP
-- BWX
-- CDX
-- DLC
Description conventions rda
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.76.D47
Item number M466 2010
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
Item number M.M.S
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Merkow, Mark S.
245 10 - TITLE STATEMENT
Title Secure and resilient software development /
Statement of responsibility, etc Mark S. Merkow, Lakshmikanth Raghavan.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boca Raton, FL :
Name of publisher, distributor, etc CRC Press,
Date of publication, distribution, etc c2010.
300 ## - PHYSICAL DESCRIPTION
Extent xxiv, 368 pages. :
Other physical details illustrations. ;
Dimensions 25 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1 How Does Software Fail Thee? Let Us Count the Ways<br/>Chapter Overview<br/>1.1 Vulnerabilities Abound<br/>1.1.1 Security Flaws Are Omnipresent<br/>1.1.2 Cars Have their Share of Computer Problems Too<br/>1.2 Tracing the Roots of Defective Software<br/>1.3 What Are the True Costs of Insecure Software to Global Enterprises?<br/>1.4 Addressing Security Questions Addresses Resilience
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 2 Characteristics of Secure and Resilient Software<br/>Chapter Overview<br/>2.1 Functional Versus Nonfunctional Requirements<br/>2.2 Testing Nonfunctional Requirements<br/>2.3 Families of Nonfunctional Requirements<br/>2.4 Availability<br/>Availability Levels and Measurements<br/>2.5 Capacity<br/>2.6 Efficiency<br/>2.7 Interoperability<br/>2.8 Manageability<br/>2.9 Cohesion<br/>2.10 Coupling<br/>2.11 Maintainability<br/>2.12 Performance<br/>2.13 Portability<br/>2.14 Privacy<br/>2.15 Recoverability<br/>2.16 Reliability<br/>2.17 Scalability<br/>2.18 Security<br/>2.19 Serviceability/Supportability<br/>2.20 Characteristics of Good Requirements<br/>2.21 Eliciting Nonfunctional Requirements<br/>2.22 Documenting Nonfunctional Requirements
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Figure 2.1<br/>Table 2.1<br/>Table 2.2<br/>Table 2.3<br/>Chapter 3 Security and Resilience in the Software Development Life Cycle<br/>Chapter Overview<br/>3.1 Resilience and Security Begin from Within<br/>3.2 Requirements Gathering and Analysis<br/>3.3 Systems Design and Detailed Design<br/>3.3.1 Functional Decomposition<br/>3.3.2 Categorizing Threats<br/>3.3.3 Ranking Threats<br/>3.3.4 Mitigation Planning<br/>3.4 Design Reviews<br/>3.5 Development (Coding) Phase<br/>3.5.1 Static Analysis<br/>3.5.2 Peer Review<br/>3.5.3 Unit Testing<br/>3.6 Testing<br/>3.7 Deployment<br/>3.8 Security Training<br/>Summary<br/>3.9 References<br/>Figure 3.1<br/>Figure 3.2<br/>Figure 3.3<br/>Figure 3.4<br/>Figure 3.5<br/>Figure 3.6<br/>Chapter 4 Proven Best Practices for Resilient Applications<br/>Chapter Overview<br/>4.1 Critical Concepts<br/>4.2 The Security Perimeter<br/>4.3 Attack Surface<br/>4.3.1 Mapping the Attack Surface<br/>4.3.2 Side Channel Attacks<br/>4.4 Application Security and Resilience Principles<br/>4.5 Practice 1: Apply Defense in Depth<br/>4.6 Practice 2: Use a Positive Security Model<br/>4.7 Practice 3: Fail Securely<br/>4.8 Practice 4: Run with Least Privilege<br/>4.9 Practice 5: Avoid Security by Obscurity<br/>4.10 Practice 6: Keep Security Simple<br/>4.11 Practice 7: Detect Intrusions<br/>4.11.1 Log All Security-Relevant Information<br/>4.11.2 Ensure That the Logs Are Monitored Regularly<br/>4.11.3 Respond to Intrusions<br/>4.12 Practice 8: Don’t Trust Infrastructure<br/>4.13 Practice 9: Don’t Trust Services<br/>4.14 Practice 10: Establish Secure Defaults<br/>4.15 Mapping Best Practices to Nonfunctional Requirements<br/>Summary
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 4.16 References<br/>Figure 4.1<br/>Figure 4.2<br/>Table 4.1<br/>Chapter 5 Designing Applications for Security and Resilience<br/>Overview<br/>5.1 Design Phase Recommendations<br/>5.1.1 Misuse Case Modeling<br/>5.1.2 Security Design and Architecture Review<br/>5.1.3 Threat and Risk Modeling<br/>5.1.4 Risk Analysis and Modeling<br/>5.1.5 Security Requirements and Test Case Generation<br/>5.2 Design to Meet Nonfunctional Requirements<br/>5.3 Design Patterns<br/>5.4 Architecting for the Web<br/>5.5 Architecture and Design Review Checklist<br/>Summary<br/>5.6 References<br/>Figure 5.1<br/>Table 5.1<br/>Table 5.2<br/>Chapter 6 Programming Best Practices<br/>Chapter Overview<br/>6.1 The Evolution of Software Attacks<br/>6.2 The OWASP Top 10<br/>6.2.1 A1: Injection<br/>6.2.2 A2: Cross-Site Scripting<br/>6.2.3 A3: Broken Authentication and Session Management<br/>6.2.4 A4: Insecure Direct Object References<br/>6.2.5 A5: Cross-Site Request Forgery<br/>6.2.6 A6: Security Misconfiguration<br/>6.2.7 A7: Failure to Restrict URL Access<br/>6.2.8 A8: Unvalidated Redirects and Forwards<br/>6.2.9 A9: Insecure Cryptographic Storage<br/>6.2.10 A10: Insufficient Transport Layer Protection<br/>6.3 OWASP Enterprise Security API (ESAPI)<br/>6.3.1 Input Validation and Handling<br/>6.3.2 Client-Side Versus Server-Side Validation<br/>6.3.3 Input Sanitization<br/>6.3.4 Canonicalization<br/>6.3.5 Examples of Attacks due to Improper Input Handling<br/>6.3.5.1 Buffer Overflow<br/>6.3.5.2 OS Commanding<br/>6.3.6 Approaches to Validating Input Data<br/>6.3.6.1 Exact Match Validation<br/>6.3.6.2 Known Good Validation<br/>6.3.6.3 Known Bad Validation<br/>6.3.7 Handling Bad Input<br/>6.3.8 ESAPI Interfaces<br/>6.4 Cross-Site Scripting<br/>6.4.1 Same Origin Policy<br/>6.4.2 Attacks Through XSS<br/>6.4.2.1 Persistent Attacks<br/>6.4.2.2 Nonpersistent Attacks<br/>6.4.2.3 DOM-Based Attacks<br/>6.4.3 Prevention of Cross-Site Scripting<br/>6.4.4 ESAPI Interfaces<br/>6.5 Injection Attacks<br/>6.5.1 SQL Injection<br/>6.5.2 Stored Procedures<br/>6.5.3 Identifying SQL Injection and Exploitation<br/>6.5.3.1 SQL Injection<br/>6.5.3.2 Blind SQL Injection<br/>6.5.4 Defending Against SQL Injection<br/>6.5.5 Creating SQL Queries<br/>6.5.6 Additional Controls to Prevent SQL Injection Attacks<br/>6.5.7 ESAPI Interfaces<br/>6.6 Authentication and Session Management<br/>6.6.1 Attacking Log-in Functionality<br/>6.6.2 Attacking Password Resets<br/>6.6.3 Attacking Sensitive Transactions<br/>6.7 Cross-Site Request Forgery<br/>6.7.1 CSRF Mitigation<br/>6.8 Session Management<br/>6.8.1 Attacking Log-out Functionality<br/>6.8.2 Defenses Against Log-out Attacks<br/>6.8.3 Defenses Against Cookie Attacks<br/>6.8.4 Session Identifiers<br/>6.8.4.1 Attacking a Session Identifier<br/>6.8.4.2 Defenses Against Session ID Attacks<br/>6.8.5 ESAPI Interfaces<br/>6.9 Access Control<br/>6.9.1 Avoiding Security Through Obscurity<br/>6.9.2 Access Control Issues<br/>6.9.3 Testing for Broken Access Control<br/>6.9.4 Defenses Against Access Control Attacks<br/>6.9.5 Administrator Interfaces<br/>6.9.6 Protecting Administrator Interfaces<br/>6.9.7 ESAPI Interfaces<br/>6.10 Cryptography<br/>6.10.1 Hashing and Password Security<br/>6.10.2 Attacking the Hash<br/>6.10.3 Precomputed Attacks<br/>6.10.4 Message Authentication Code (MAC)<br/>6.10.5 Home-Grown Algorithms<br/>6.10.6 Randomness and Pseudo-Randomness<br/>6.10.7 ESAPI Interfaces<br/>6.11 Error Handling<br/>6.11.1 User Error Messages<br/>6.11.2 Log-in Error Messages—A Case Study<br/>6.11.3 Error Message Differentiation<br/>6.11.4 Developer Error Messages<br/>6.11.5 Information to Be Kept Private<br/>6.11.6 Structured Exception Handling<br/>6.11.7 ESAPI Interfaces<br/>6.12 Ajax and Flash<br/>6.12.1 AJAX Application Traffic<br/>6.12.2 AJAX Client Requests<br/>6.12.3 Server Responses<br/>6.12.4 Typical Attacks Against AJAX Applications<br/>6.12.5 Security Recommendations for AJAX Applications<br/>6.12.6 Adobe Flash—Sandbox Security Model<br/>6.12.7 Cross-Domain Policy<br/>6.12.8 Restrict SWF Files Embedded in HTML<br/>6.12.9 Attacking Flash Applications<br/>6.12.10 Securing Flash Applications<br/>6.13 Additional Best Practices for Software Resilience<br/>6.13.1 Externalize Variables<br/>6.13.2 EncryptedProperties—Method Summary<br/>6.13.3 Initialize Variables Properly<br/>6.13.4 Do Not Ignore Values Returned by Functions<br/>6.13.5 Avoid Integer Overflows<br/>6.14 Top 10 Secure Coding Practices<br/>6.15 Fifty Questions to Improve Software Security<br/>Summary<br/>6.16 References<br/>Figure 6.1<br/>Figure 6.2<br/>Figure 6.3<br/>Figure 6.4<br/>Figure 6.5<br/>Figure 6.6<br/>Figure 6.7<br/>Table 6.1<br/>Table 6.2<br/>Table 6.3<br/>Table 6.4<br/>Table 6.5<br/>Table 6.6<br/>Table 6.7<br/>Table 6.8
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer software
General subdivision Development.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer software
General subdivision Reliability.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Raghavan, Lakshmikanth.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
  Dewey Decimal Classification     Computers & Information Technology ( Computer Science ) Main library Main library A2 13/12/2012 Sphinx publishing 530.00 PU   005.8 M.M.S 00009312 19/02/2025 13/12/2012 Books