Secure By Design
Authors: Daniel Deogun – Dan Bergh Johnsson – Daniel Sawano
ISBN-10: 1617294357
ISBN-13: 9781617294358
Edition 版次: 1
Publication Date 出版日期: 2019-09-10
Print Length 页数: 400 pages
Book Description
By finelybook
Secure by: Design teaches developers how to use design to drive security in software development. This book is full of patterns,best practices,and mindsets that you can directly apply to your real world development. You’ll also learn to spot weaknesses in legacy code and how to address them.
Security should be the natural outcome of your development process. As applications increase in complexity,it becomes more important to bake security-mindedness into every step. The secure-by-design approach teaches best practices to implement essential software features using design as the primary driver for security.
Secure by: Design teaches you principles and best practices for writing highly secure software. At the code level,you’ll discover security-promoting constructs like safe error handling,secure validation,and domain primitives. You’ll also master security-centric techniques you can apply throughout your build-test-deploy pipeline,including the unique concerns of modern microservices and cloud-native designs.
What’s inside
Secure-by-design concepts
Spotting hidden security problems
Secure code constructs
Assessing security by: identifying common design flaws
Securing legacy and microservices architectures
contents
foreword
preface
acknowledgments
about this book
about the authors
about the cover illustration
Part 1: Introduction
Chapter 1: Why design matters for security
Chapter 2: Intermission: The anti-Hamlet
Part 2: Fundamentals
Chapter 3: Core concepts of Domain-Driven Design
Chapter 4: Code constructs promoting security
Chapter 5: Domain primitives
Chapter 6: Ensuring integrity of state
Chapter 7: Reducing complexity of state
Chapter 8: Leveraging your delivery pipeline for security
Chapter 9: . Handling failures securely
Chapter 10: Benefits of cloud thinking
Chapter 11: Intermission: An insurance policy for free
Part 3: Applying the fundamentals
Chapter 12: Guidance in legacy code
Chapter 13: Guidance on microservices
Chapter 14: A final word: Don’t forget about security!
Lists of Figures
List of Tables
List of Listings