Agile Application Security

Enabling Security in a Continuous Delivery Pipeline



Bookstore > Books > Agile Application Security

Agile Application Security
Price$32.77 - $42.99
Rating
AuthorsJim Bird, Laura Bell, Michael Brunton-Spall, Rich Smith
PublisherO'Reilly Media
Published2017
Pages378
LanguageEnglish
FormatPaper book / ebook
ISBN-101491938846
ISBN-139781491938843
EBook Hardcover Paperback

Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren't up to speed in their understanding and experience of agile development. To help bridge the divide between these two worlds, this practical guide introduces several security tools and techniques adapted specifically to integrate with agile development.

Written by security experts and agile veterans, this book begins by introducing security principles to agile practitioners, and agile principles to security practitioners. The authors also reveal problems they encountered in their own experiences with agile security, and how they worked to solve them.

Add security practices to each stage of your existing development lifecycle; Integrate security with planning, requirements, design, and at the code level; Include security testing as part of your team's effort to deliver working software in each release; Implement regulatory compliance in an agile or DevOps environment; Build an effective security program through a culture of empathy, openness, transparency, and collaboration.




4 5 22

Similar Books


Pro PHP Security, 2nd Edition

Pro PHP Security, 2nd Edition

PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the 2nd edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also delve into recent developments like mobile security, the impact of J...
Application Security for the Android Platform

Application Security for the Android Platform

With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You'll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker's...
The Manager's Guide to Web Application Security

The Manager's Guide to Web Application Security

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively. Often, security vulnerabilities are difficult to understand and quantify because they are the resu...
Hacking Exposed Web Applications, 3rd Edition

Hacking Exposed Web Applications, 3rd Edition

Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentic...
Learning iOS Security

Learning iOS Security

iOS has quickly become one of the most popular mobile operating systems, not only with users, but also with developers and companies. This also makes it a popular platform for malicious adversaries. iOS users and developers need to be constantly aware of their mobile security risks. Because of this, there is great demand for risk assessme...
Expert Oracle and Java Security

Expert Oracle and Java Security

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You'll learn to consider potential vulnerabilities, and to apply best pra...