O'Reilly logo

Core Software Security by Anmol Misra, James Ransome

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

xii Core Software Security
Chapter 10 Pulling It All Together: Using the SDL to
Prevent Real-World Threats 325
10.1 Strategic, Tactical, and User-Specific
Software Attacks 326
10.1.1 Strategic Attacks 328
10.1.2 Tactical Attacks 338
10.1.3 User-Specific Attacks 339
10.2 Overcoming Organizational and Business
Challenges with a Properly Designed,
Managed, and Focused SDL 339
10.3 Software Security Organizational Realities
and Leverage 340
10.4 Overcoming SDL Audit and Regulatory
Challenges with Proper Governance
Management 342
10.5 Future Predications for Software Security 343
10.5.1 The Bad News 343
10.5.2 The Good News 345
10.6 Conclusion 345
References 347
Appendix 351
Index 359

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required