Skip to content
Scan a barcode
Scan
Added to your cart
Hardcover Software Security Engineering Book

ISBN: 1614701288

ISBN13: 9781614701286

Software Security Engineering

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Very Good

$5.49
Save $0.50!
List Price $5.99
Almost Gone, Only 3 Left!

You Might Also Enjoy

Timeless Wisdom: Passages for Meditation from the World's Saints and Sages (Essential Easwaran Library)
Timeless Wisdom: Passages for Meditation from the World's Saints and Sages (Essential Easwaran Library)
Eknath Easwaran, Michael Scott

from: $5.39

How Elizabeth Barrett Browning Saved My Life
How Elizabeth Barrett Browning Saved My Life
Mameve Medwed

from: $4.99

Going-natural: How to Fall in Love With Nappy Hair
Going-natural: How to Fall in Love With Nappy Hair
Mireille Liong-a-kong

from: $5.09

The Pocket Idiot's Guide to Superfoods (The Pocket Idiot's Guide)
The Pocket Idiot's Guide to Superfoods (The Pocket Idiot's Guide)
Heidi Reichenberger McIndoo, Heidi Reichenberger McIndoo M.S. R.D. L.D.N.

from: $32.69

Primary Care Medicine: Office Evaluation and Management of the Adult Patient (Primary Care Medicine ( Goroll ))
Primary Care Medicine: Office Evaluation and Management of the Adult Patient (Primary Care Medicine ( Goroll ))
Albert G. Mulley, Allan H. Goroll, Lawrence A. May

from: $7.49

Medical Biochemistry
Medical Biochemistry
John W. Baynes

from: $6.79

The Undead Kama Sutra (Felix Gomez #3)
The Undead Kama Sutra (Felix Gomez #3)
Mario Acevedo

from: $5.69

Structured Analysis and System Specification
Structured Analysis and System Specification
Tom DeMarco, Tom de Marco

from: $5.39

Junie B. Jones and Her Big Fat Mouth
Junie B. Jones and Her Big Fat Mouth
Barbara Park

from: $4.19

Stedman's Medical & Surgical Equipment Words, Fifth Edition, on CD-ROM
Stedman's Medical & Surgical Equipment Words, Fifth Edition, on CD-ROM
Stedman's

from: $4.99

Mad Mary: A Bad Girl from Magdala, Transformed at His Appearing
Mad Mary: A Bad Girl from Magdala, Transformed at His Appearing
Liz Curtis Higgs

from: $4.49

Introduction to Psychology and Counseling,: Christian Perspectives and Applications
Introduction to Psychology and Counseling,: Christian Perspectives and Applications
Paul D. Meier, Frank Minirth, Frank B. Minirth, Frank B. Wichern

from: $5.29

Junie B. Jones and Some Sneaky Peeky Spying
Junie B. Jones and Some Sneaky Peeky Spying
Barbara Park

from: $4.79

Gnomes
Gnomes
Wil Huygen

from: $13.39

Junie B., First Grader: Toothless Wonder
Junie B., First Grader: Toothless Wonder
Barbara Park

from: $4.19

Total Fitness and Wellness, Brief Edition [with Behavior Change Log Book & Wellness Journal]
Total Fitness and Wellness, Brief Edition [with Behavior Change Log Book & Wellness Journal]
Scott K. Powers, Stephen L. Dodd, Virginia J. Noland, Erica M. Jackson

from: $6.09

Naturally Gourmet: Simple Plant-based Recipes that are Healthy & Delicious
Naturally Gourmet: Simple Plant-based Recipes that are Healthy & Delicious
Karen Houghton

from: $7.99

Healing Addiction: An Integrated Pharmacopsychosocial Approach to Treatment
Healing Addiction: An Integrated Pharmacopsychosocial Approach to Treatment
Bennett Alan Weinberg, Bonnie K. Bealer, Peter R. Martin

from: $64.42

Jawetz, Melnick, & Adelberg's Medical Microbiology (LANGE Basic Science)
Jawetz, Melnick, & Adelberg's Medical Microbiology (LANGE Basic Science)
Karen C. Carroll, Timothy A. Mietzner, Janet S. Butel, George F. Brooks, Stephen A. Morse

from: $5.39

Set Sail for Murder
Set Sail for Murder
R.T. Jordan, Richard Tyler Jordan

from: $6.99

Book Overview

Software engineering has established techniques, methods and technology over two decades. However, due to the lack of understanding of software security vulnerabilities, we have been not successful in applying software engineering principles when developing secured software systems. Therefore software security can not be added after a system has been built as seen on today's software applications. This book provides concise and good practice design guidelines on software security which will benefit practitioners, researchers, learners, and educators. Topics discussed include systematic approaches to engineering; building and assuring software security throughout software lifecycle; software security based requirements engineering; design for software security; software security implementation; best practice guideline on developing software security; test for software security and quality validation for software security. This description may be from another edition of this product.

Customer Reviews

0 customer rating | 0 review
There are currently no reviews. Be the first to review this work.
Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured