

Paperback: 1200 pages
Publisher: Addison-Wesley Professional; 1 edition (November 30, 2006)
Language: English
ISBN-10: 9780321444424
ISBN-13: 978-0321444424
ASIN: 0321444426
Product Dimensions: 9.1 x 2.5 x 7.3 inches
Shipping Weight: 4 pounds (View shipping rates and policies)
Average Customer Review: 4.7 out of 5 stars See all reviews (27 customer reviews)
Best Sellers Rank: #90,690 in Books (See Top 100 in Books) #20 in Books > Computers & Technology > Certification > CompTIA #103 in Books > Textbooks > Computer Science > Networking #104 in Books > Textbooks > Computer Science > Software Design & Engineering

This should have been the third book in line to be reviewed, but as I leafed through it, once, twice, and a third time I started to realize this is one of those rare security books that has a chance to revolutionize the industry like Applied Cryptography, Snort 2.0, or Hacking Exposed. The longer you wait to read this book, the further you will fall behind. Nuff said?Every week that goes by we see an increasing understanding in the community about how important secure software is and that it takes the appropriate development process to create secure software. This book is hitting the marketplace at the perfect time, I hope the authors and publishing team have a runaway success, you deserve it. I also hope people will be encouraged by this book, secure software development is certainly possible, this book clearly shows that. It takes management support in terms of resources, training and good process, but it can certainly be done. At 1128 content pages, much of this material will be things that you have picked up in other places, such as other books or courses you have taken. Much of it will be things you once knew and forgot. But this is the most complete book on software security out there covering Windows, Unix, Network Protocols, Web and other Applications.What I particularly love is the how approachable the majority of the information is. Please do not get me wrong, if you have never written a line of code you are going to be lost during the code examples, the only signpost you get is the occasional bolded line, but you will still be able to clearly follow the discussion before the code example and right after the code example.Section 1 of the book is called an Introduction to Software Security Assessment.
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities (2 Volume set) Social Security & Medicare Facts 2016: Social Security Coverage, Maximization Strategies for Social Security Benefits, Medicare/Medicaid, Social Security Taxes, Retirement & Disability, Ser Keeping Livestock Healthy: A Comprehensive Veterinary Guide to Preventing and Identifying Disease in Horses, Cattle, Swine, Goats & Sheep, 4th Edition Identifying Spiders: The New Compact Study Guide and Identifier (Identifying Guide Series) Identifying Coca-Cola Collectibles (Identifying Guide Series) Value-Range Analysis of C Programs: Towards Proving the Absence of Buffer Overflow Vulnerabilities Security Risk Assessment: Managing Physical and Operational Security Essentials of Assessing, Preventing, and Overcoming Reading Difficulties (Essentials of Psychological Assessment) Identifying Perinatal Depression and Anxiety: Evidence-based Practice in Screening, Psychosocial Assessment and Management Pocket Companion for Physical Examination and Health Assessment, 6e (Jarvis, Pocket Companion for Physical Examination and Health Assessment) Advanced Health Assessment of Women, Third Edition: Clinical Skills and Procedures (Advanced Health Assessment of Women: Clinical Skills and Pro) Rabbit Medicine and Surgery: Self-Assessment Color Review, Second Edition (Veterinary Self-Assessment Color Review Series) ParaPro Assessment Secrets Study Guide: ParaProfessional Test Review for the ParaPro Assessment Orthopedic Physical Assessment, 5e (Orthopedic Physical Assessment (Magee)) Control Self-Assessment: Reengineering Internal Control (Enterprise Governance, Control, Audit, Security, Risk Management and Business Continuity) Managing Water and Agroecosystems for Food Security (Comprehensive Assessment of Water Management in Agriculture Series) Occupational and Environmental Health: Recognizing and Preventing Disease and Injury (Levy, Occupational and Envionmental Health) Dynamic Networks and Cyber-Security: 1 (Security Science and Technology) The Healthiest Diet on the Planet: Why the Foods You Love-Pizza, Pancakes, Potatoes, Pasta, and More-Are the Solution to Preventing Disease and Looking and Feeling Your Best Occupational and Environmental Health: Recognizing and Preventing Disease and Injury