Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Secure by design
by
Johnsson, Dan Bergh, author
, Deogun, Daniel, author
, Sawano, Daniel, author
, Terhorst-North, Daniel, writer of foreword
in
Computer software Development.
/ Application software Development.
/ Computer security.
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Secure by design
by
Johnsson, Dan Bergh, author
, Deogun, Daniel, author
, Sawano, Daniel, author
, Terhorst-North, Daniel, writer of foreword
in
Computer software Development.
/ Application software Development.
/ Computer security.
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Book
Secure by design
Available to read in the library!
Request Book From Autostore
and Choose the Collection Method
Overview
Security should be the natural outcome of your development process. As applications increase in complexity, it becomes more important to bake security-mindedness into every step. The secure-by-design approach teaches best practices to implement essential software features using design as the primary driver for security. \"Secure by Design\" teaches you principles and best practices for writing highly secure software. At the code level, you'll discover security-promoting constructs like safe error handling, secure validation, and domain primitives. You'll also master security-centric techniques you can apply throughout your build-test-deploy pipeline, including the unique concerns of modern microservices and cloud-native designs. -- From publisher's description.
Publisher
Manning Publications Co.
ISBN
9781617294358, 1617294357
Item info:
1
item available
1
item total in all locations
| Call Number | Copies | Material | Location |
|---|---|---|---|
| QA76.754.D45 2019 | 1 | BOOK | AUTOSTORE |
This website uses cookies to ensure you get the best experience on our website.