Secure By Design

豆瓣
Secure By Design

登录后可管理标记收藏。

ISBN: 9781617294358
作者: Daniel Deogun / Dan Bergh Johnsson / Daniel Sawano
出版社: Manning Publications
发行时间: 2019 -9
价格: USD 49.99
页数: 400

/ 10

0 个评分

评分人数不足
借阅或购买

Daniel Deogun / Dan Bergh Johnsson   

简介

Summary
Secure by Design teaches developers how to use design to drive security in software development. This book is full of patterns, best practices, and mindsets that you can directly apply to your real world development. You'll also learn to spot weaknesses in legacy code and how to address them.
Foreword by Daniel Terhorst-North.
Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.
About the Technology
Security should be the natural outcome of your development process. As applications increase in complexity, it becomes more important to bake security-mindedness into every step. The secure-by-design approach teaches best practices to implement essential software features using design as the primary driver for security.
About the Book
Secure by Design teaches you principles and best practices for writing highly secure software. At the code level, you'll discover security-promoting constructs like safe error handling, secure validation, and domain primitives. You’ll also master security-centric techniques you can apply throughout your build-test-deploy pipeline, including the unique concerns of modern microservices and cloud-native designs.
What's inside
Secure-by-design concepts
Spotting hidden security problems
Secure code constructs
Assessing security by identifying common design flaws
Securing legacy and microservices architectures
About the Reader
Readers should have some experience in designing applications in Java, C#, .NET, or a similar language.

目录

Table of Contents
PART 1 - Introduction
Why design matters for security
Intermission: The anti-Hamlet
PART 2 - Fundamentals
Core concepts of Domain-Driven Design
Code constructs promoting security
Domain primitives
Ensuring integrity of state
Reducing complexity of state
Leveraging your delivery pipeline for security
Handling failures securely
Benefits of cloud thinking
Intermission: An insurance policy for free
PAT 3 - Applying the fundamentals
Guidance in legacy code
Guidance on microservices
A final word: Don't forget about security!

短评
评论
笔记