Security Engineering Explained

From Guidance Share

(Difference between revisions)
Jump to: navigation, search
Revision as of 02:29, 26 November 2006 (edit)
Admin (Talk | contribs)

← Previous diff
Revision as of 02:35, 26 November 2006 (edit)
Admin (Talk | contribs)

Next diff →
Line 1: Line 1:
 +- J.D. Meier, Alex Mackman, Blaine Wastell, Prashant Bansode, Jason Taylor, Rudolph Araujo
 +
 +
To design, build, and deploy secure applications, you must integrate security into your application development life cycle and adapt your current software engineering practices and methodologies to include specific security-related activities. The following overview shows you how to integrate security into your application development: To design, build, and deploy secure applications, you must integrate security into your application development life cycle and adapt your current software engineering practices and methodologies to include specific security-related activities. The following overview shows you how to integrate security into your application development:
* [[Security Engineering Explained - Chapter 1 - Introduction | Chapter 1 - Introduction]] * [[Security Engineering Explained - Chapter 1 - Introduction | Chapter 1 - Introduction]]
* [[Security Engineering Explained - Chapter 2 - Security Objectives | Chapter 2 - Security Objectives]] * [[Security Engineering Explained - Chapter 2 - Security Objectives | Chapter 2 - Security Objectives]]

Revision as of 02:35, 26 November 2006

- J.D. Meier, Alex Mackman, Blaine Wastell, Prashant Bansode, Jason Taylor, Rudolph Araujo


To design, build, and deploy secure applications, you must integrate security into your application development life cycle and adapt your current software engineering practices and methodologies to include specific security-related activities. The following overview shows you how to integrate security into your application development:

Personal tools