Skip to Content
Application Security Program Handbook
book

Application Security Program Handbook

by Derek Fisher
January 2023
Intermediate to advanced content levelIntermediate to advanced
296 pages
10h 8m
English
Manning Publications
Content preview from Application Security Program Handbook

3 Components of application security

This chapter covers

  • Building a threat model
  • Discovering security analysis tools used in the development pipeline
  • Exploring protection tools available for running applications
  • Explaining vulnerability collection, correlation, and prioritization
  • Looking at Bug Bounty and Vulnerability Disclosure programs

So, you have seen the issues that are caused by not having application security integrated into your life cycle and you’re starting to ask the great question of where to start. There is not a one-size-fits-all package that works for all organizations. A lot depends on the following:

  • Size of the organization

  • The industry and the regulations impacting the organization

  • The culture of the organization

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Application Security - A complete guide

Application Security - A complete guide

Derek Fisher
Defensive Security Handbook, 2nd Edition

Defensive Security Handbook, 2nd Edition

Lee Brotherston, Amanda Berlin, William F. Reyor

Publisher Resources

ISBN: 9781633439818Publisher SupportOtherPublisher WebsitePurchase Link