
Secure Development
Strategies and Best Practices for Ensuring Software Security
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.
Add to Cart failed.
Please try again later
Add to Wish List failed.
Please try again later
Remove from wishlist failed.
Please try again later
Adding to library failed
Please try again
Follow podcast failed
Please try again
Unfollow podcast failed
Please try again
Access a growing selection of included Audible Originals, audiobooks, and podcasts.
You will get an email reminder before your trial ends.
Audible Plus auto-renews for $7.95/mo after 30 days. Upgrade or cancel anytime.
Buy for $4.99
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.
-
Narrated by:
-
Virtual Voice

This title uses virtual voice narration
Virtual voice is computer-generated narration for audiobooks.
About this listen
Delve into the specifics of secure designing that can inhibit cyber attackers from exploiting your application. From minimizing the attack surface to designing secure failures, each principle is explored deeply and clearly. Our chapter on threat modeling introduces you to the methodology and STRIDE classification, ensuring your software mastering by making it impregnable.
Navigate through pitfalls as you explore our comprehensive guide to secure coding practices such as building secure input fields, mitigating buffer overflows, SQL Injection prevention, and cross-site scripting.
Authentication and authorization play a crucial role in software security. This eBook helps you comprehend and apply secure authentication and session management practices. Data protection, secure communications, and security risk analysis will no longer be abstruse terms but will become your trusted arsenal in creating secure software.
"Secure Development" also covers important aspects like software security audits, code reviews, disaster recovery planning in the event of security incidents, and much more. Learn about the intricacies of patch management, application updates, and how user education and training serve as important allies in maintaining the security robustness of your applications.
Get an exclusive view of what the future of application security looks like with the last chapter. It discusses the role of Artificial Intelligence and Machine Learning in enhancing application security in the face of emerging threats and the ever-evolving digital landscape.
Embark on this enriching journey to master secure software development with "Secure Development," a wholesome, elaborate guide. Equip yourself with this crucial knowledge and bring security to the forefront of your software development efforts.
adbl_web_global_use_to_activate_webcro768_stickypopup