Security Engineering Explained

From Guidance Share

(Difference between revisions)
Jump to: navigation, search
Revision as of 21:37, 26 November 2006 (edit)
Admin (Talk | contribs)

← Previous diff
Current revision (09:44, 24 January 2010) (edit)
JD (Talk | contribs)

 
Line 1: Line 1:
 +<em style="margin:0;background-color:#cedff2;font-family:sans-serif;border:1px solid #a3b0bf;text-align:center;color:#000;padding:0.2em 0.4em;">
 +Note - patterns & practices Security Engineering is now live at http://msdn.microsoft.com/en-us/library/ms998382.aspx.
 +</em>
 +
 +
- J.D. Meier, Alex Mackman, Blaine Wastell, Prashant Bansode, Jason Taylor, Rudolph Araujo - J.D. Meier, Alex Mackman, Blaine Wastell, Prashant Bansode, Jason Taylor, Rudolph Araujo
Line 5: Line 10:
-* [[Security Engineering Explained - Chapter 1 - Introduction | Chapter 1 - Introduction]]+* [[Security Engineering Explained - Introduction | Introduction]]
 +* [[Security Engineering Explained - Chapter 1 - Security Engineering Approach | Chapter 1 - Security Engineering Approach]]
* [[Security Engineering Explained - Chapter 2 - Security Objectives | Chapter 2 - Security Objectives]] * [[Security Engineering Explained - Chapter 2 - Security Objectives | Chapter 2 - Security Objectives]]
* [[Security Engineering Explained - Chapter 3 - Security Design Guidelines | Chapter 3 - Security Design Guidelines]] * [[Security Engineering Explained - Chapter 3 - Security Design Guidelines | Chapter 3 - Security Design Guidelines]]
* [[Security Engineering Explained - Chapter 4 - Threat Modeling | Chapter 4 - Threat Modeling]] * [[Security Engineering Explained - Chapter 4 - Threat Modeling | Chapter 4 - Threat Modeling]]
-* [[Security Engineering Explained - Chapter 5 - Security Architecture and Design Reviews | Chapter 5 - Security Architecture and Design Reviews]]+* [[Security Engineering Explained - Chapter 5 - Security Architecture and Design Review | Chapter 5 - Security Architecture and Design Review]]
 +* [[Security Engineering Explained - Chapter 6 - Security Code Review | Chapter 6 - Security Code Review]]
 +* [[Security Engineering Explained - Chapter 7 - Security Deployment Review | Chapter 7 - Security Deployment Review]]

Current revision

Note - patterns & practices Security Engineering is now live at http://msdn.microsoft.com/en-us/library/ms998382.aspx.


- J.D. Meier, Alex Mackman, Blaine Wastell, Prashant Bansode, Jason Taylor, Rudolph Araujo


To design, build, and deploy secure applications, you must integrate security into your application development life cycle and adapt your current software engineering practices and methodologies to include specific security-related activities. The following overview shows you how to integrate security into your application development:


Personal tools