Description
The book "The 7 Qualities of Highly Secure Software" provides a framework for designing, developing, and deploying hacker-resilient software. The book uses engaging anecdotes and analogies-ranging from Aesop's fables, athletics, architecture, biology, nursery rhymes, and video games-to illustrate the qualities that are essential for the development of highly secure software. Each chapter details one of the seven qualities that can make your software highly secure and less susceptible to hacker threats. Leveraging real-world experiences and examples, the book:
-Explains complex security concepts in language that is easy to understand for professionals involved in management, software development, and operations
-Specifies the qualities and skills that are essential for building secure software
-Highlights the parallels between the habits of effective people and qualities in terms of software security
Praise for the Book:
This will be required reading for my executives, security team, software architects and lead developers. -David W. Stender, CISSP, CSSLP, CAP, CISO of the US Internal Revenue Service
Developing highly secure software should be at the forefront of organizational strategy and this book provides a framework to do so. -Troy Leach, CTO
The 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies-ranging from Aesop's fables, athletics, architecture, biology, nursery rhymes, and video games-to illustrate the qualities that are essential for the development of highly secure software. Each chapter details one of the seven qualities that can make your software highly secure and less susceptible to hacker threats. Leveraging real-world experiences and examples, the book: * Explains complex security concepts in language that is easy to understand for professionals involved in management, software development, and operations * Specifies the qualities and skills that are essential for building secure software * Highlights the parallels between the habits of effective people and qualities in terms of software security Praise for the Book: This will be required reading for my executives, security team, software architects and lead developers. -David W. Stender, CISSP, CSSLP, CAP, CISO of the US Internal Revenue Service Developing highly secure software should be at the forefront of organizational strategy and this book provides a framework to do so. -Troy Leach, CTO, PCI Security Standards Council This book will teach you the core, critical skills needed to raise the security bar on the attackers and swing the game in your favor. -Michael Howard, Principal Cyber Security Program Manager, Microsoft As a penetration tester, my job will be a lot harder as people read this book! -Kevin Johnson, Security Consultant, Secure Ideas Review: This will be required reading for my executives, security team, software architects and lead developers. -David W. Stender, CISSP, CSSLP, CAP, CISO of the US Internal Revenue Service Developing highly secure software should be at the forefront of organizational strategy and this book provides a framework to do so. -Troy Leach, CTO, PCI Security Standards Council This book will teach you the core, critical skills needed to raise the security bar on the attackers and swing the game in your favor. -Michael Howard, Principal Cyber Security Program Manager, Microsoft As a penetration tester, my job will be a lot harder as people read this book! -Kevin Johnson, Security Consultant, Secure Ideas At 130 pages, the book quickly focuses on the core points of the issue. Paul writes in an easy to read and understand style. With the use of various stories and examples; the need for secure software development is undeniable. ... The 7 Qualities of Highly Secure Software highlights the qualities that are essential and critical to stop insecure code. This is a highly valuable book that can be of significant use to every stakeholder-from those in the boardroom to the developers and head of application development. Ultimately, this is a book you want all of your software developers to read. -Ben Rothke, CISSP, CISA, Information Security Manager, Wyndham Worldwide