Software engineering has established techniques, methods and technology over two decades. However, due to the lack of understanding of software security vulnerabilities, we have been not successful in applying software engineering principles when developing secured software systems. Therefore software security cannot be added after a system has been built as seen on today's software applications. This book provides concise and good practice design guidelines on software security which will benefit practitioners, researchers, learners, and educators. Topics discussed include systematic approaches to engineering; building and assuring software security throughout software lifecycle; software security based requirements engineering; design for software security; software security implementation; best practice guideline on developing software security; and, test for software security and quality validation for software security.
Cited By
- Ramachandran M (2016). Software security requirements management as an emerging cloud computing service, International Journal of Information Management: The Journal for Information Professionals, 36:4, (580-590), Online publication date: 1-Aug-2016.
- Chang V, Ramachandran M, Yao Y, Kuo Y and Li C (2016). A resiliency framework for an enterprise cloud, International Journal of Information Management: The Journal for Information Professionals, 36:1, (155-166), Online publication date: 1-Feb-2016.
Recommendations
Security Engineering Approach to Support Software Security
SERVICES '10: Proceedings of the 2010 6th World Congress on ServicesAs information security and privacy become increasingly important to organizations, the demand grows for software development processes that assure information integrity, availability, and confidentiality. Unfortunately, despite the investments made in ...
Security software engineering: do it the right way
SEPADS'07: Proceedings of the 6th WSEAS International Conference on Software Engineering, Parallel and Distributed SystemsSecure software development is one of the most information system issues that raised through the use of the internet and networked systems. The importance of developing secure software increases. In this work we present a process for the development of ...